The IT Law Wiki
Register
Advertisement

Definition[]

BES Cyber System Information is

[i]nformation about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements.[1]

Overview[]

Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.[2]

References[]

  1. NERC, Glossary of Terms Used in NERC Reliability Standards 10 (Feb. 13, 2014) (full-text).
  2. Id.
Advertisement