SlideShare a Scribd company logo
1 of 1
Compliance Audits
1. Audit Preparedness
2. Audit Findings Resolution
1. Unpreparedness for compliance audits
2. Unresolved audit findings
Physical Security 3. Perimeter Access Control
4. Physical Security Incidents
3. Unauthorized access incidents
4. Physical security incidents
Cybersecurity
5. Cybersecurity Vulnerability
Remediation
6. Incident Response Effectiveness
5. Delayed or unresolved vulnerabilities
6. Slow response to cybersecurity incidents
Training and
Awareness
7. NERC-CIP Training Participation
8. Policy Acknowledgment
7. Lack of awareness in NERC-CIP policies
8. Policy non-compliance by employees
Data Protection
9. Data Encryption Compliance
10. Data Loss Incidents
9. Data encryption deficiencies
10. Data breaches or losses
Physical Access
Control
11. Physical Access Logging
12. Unauthorized Physical Access
11. Lack of access control monitoring
12. Unauthorized physical access incidents
Incident Response 13. Incident Response Time
14. Incident Escalation Rate
13. Slow response to security incidents
14. Increased incidents due to delays
Category KPIs KRIs
NERC-CIP Compliance KPIs and KRIs
Monitor the performance and risks of complying with North American Electric Reliability Corporation
Critical Infrastructure Protection (NERC-CIP) standards for electric infrastructure security.

More Related Content

Similar to NERC-CIP Compliance KPIs and KRIs

Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808baratta44
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupFeroot
 
SEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSSEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSCRUZ CERDA
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?PECB
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsBim Akinfenwa
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsBim Akinfenwa
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsBim Akinfenwa
 
GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIsBim Akinfenwa
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIsBim Akinfenwa
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASISDermot Clarke
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Osborne Clarke
 
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptx
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptxEnhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptx
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptxerickxandergarin
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsShawn Tuma
 

Similar to NERC-CIP Compliance KPIs and KRIs (20)

Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
SEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINSSEVEN DEADLY CYBERSECURITY SINS
SEVEN DEADLY CYBERSECURITY SINS
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIs
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIs
 
Breach response
Breach responseBreach response
Breach response
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIs
 
GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIs
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIs
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
 
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...Challenges and opportunities in the paperless NHS & beyond - A data protectio...
Challenges and opportunities in the paperless NHS & beyond - A data protectio...
 
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptx
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptxEnhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptx
Enhancing-Server-Security-in-hardware-side-Dec-23-2023-2.pptx
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
 
Security audit
Security auditSecurity audit
Security audit
 

More from Bim Akinfenwa

Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIsBim Akinfenwa
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIsBim Akinfenwa
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsBim Akinfenwa
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsBim Akinfenwa
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Bim Akinfenwa
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsBim Akinfenwa
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioBim Akinfenwa
 
In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!Bim Akinfenwa
 
5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignoredBim Akinfenwa
 
Future of wearable devices 2016
Future of wearable devices 2016Future of wearable devices 2016
Future of wearable devices 2016Bim Akinfenwa
 
Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Bim Akinfenwa
 
5 Quotes to get over the lonely days
5 Quotes to get over the lonely days5 Quotes to get over the lonely days
5 Quotes to get over the lonely daysBim Akinfenwa
 
Project status one page
Project status one pageProject status one page
Project status one pageBim Akinfenwa
 
Epic content marketing strategy
Epic content marketing strategyEpic content marketing strategy
Epic content marketing strategyBim Akinfenwa
 
Product Release Road-map Guide
Product Release Road-map GuideProduct Release Road-map Guide
Product Release Road-map GuideBim Akinfenwa
 
Product user persona
Product user personaProduct user persona
Product user personaBim Akinfenwa
 

More from Bim Akinfenwa (18)

BCDR KPIs and KRIs
BCDR KPIs and KRIsBCDR KPIs and KRIs
BCDR KPIs and KRIs
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIs
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIs
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIs
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIs
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIs
 
SDLC KPIs and KRIs
SDLC KPIs and KRIsSDLC KPIs and KRIs
SDLC KPIs and KRIs
 
Key metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
 
In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!In Good company: 10 People who failed but Never Quit. You can WIN also!
In Good company: 10 People who failed but Never Quit. You can WIN also!
 
5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored5 Reasons Africa Cant be ignored
5 Reasons Africa Cant be ignored
 
Future of wearable devices 2016
Future of wearable devices 2016Future of wearable devices 2016
Future of wearable devices 2016
 
Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063 Our Aspiration for the Africa we want: Agenda 2063
Our Aspiration for the Africa we want: Agenda 2063
 
5 Quotes to get over the lonely days
5 Quotes to get over the lonely days5 Quotes to get over the lonely days
5 Quotes to get over the lonely days
 
Project status one page
Project status one pageProject status one page
Project status one page
 
Epic content marketing strategy
Epic content marketing strategyEpic content marketing strategy
Epic content marketing strategy
 
Product Release Road-map Guide
Product Release Road-map GuideProduct Release Road-map Guide
Product Release Road-map Guide
 
Product user persona
Product user personaProduct user persona
Product user persona
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

NERC-CIP Compliance KPIs and KRIs

  • 1. Compliance Audits 1. Audit Preparedness 2. Audit Findings Resolution 1. Unpreparedness for compliance audits 2. Unresolved audit findings Physical Security 3. Perimeter Access Control 4. Physical Security Incidents 3. Unauthorized access incidents 4. Physical security incidents Cybersecurity 5. Cybersecurity Vulnerability Remediation 6. Incident Response Effectiveness 5. Delayed or unresolved vulnerabilities 6. Slow response to cybersecurity incidents Training and Awareness 7. NERC-CIP Training Participation 8. Policy Acknowledgment 7. Lack of awareness in NERC-CIP policies 8. Policy non-compliance by employees Data Protection 9. Data Encryption Compliance 10. Data Loss Incidents 9. Data encryption deficiencies 10. Data breaches or losses Physical Access Control 11. Physical Access Logging 12. Unauthorized Physical Access 11. Lack of access control monitoring 12. Unauthorized physical access incidents Incident Response 13. Incident Response Time 14. Incident Escalation Rate 13. Slow response to security incidents 14. Increased incidents due to delays Category KPIs KRIs NERC-CIP Compliance KPIs and KRIs Monitor the performance and risks of complying with North American Electric Reliability Corporation Critical Infrastructure Protection (NERC-CIP) standards for electric infrastructure security.