Search
- Program Document
- Program Document
The Controls Guidance and Compliance Failure Points document guides registered entities in assessing risks associated with their business activities and designing appropriate internal controls in response. To help your entity get started, WECC has identified generic control objectives to mitigate the risks associated with the risks associated with FAC-002-4. You may want to consider these two objectives:
Control Objective 1: Study the impact of interconnecting new or changed Facilities on the Bulk Electric System. (Long-term Studies/Assessments)Control Objective 2: Coordinate data required to conduct reliability impact studies. (Entity Coordination, Long-term Studies/Assessments)
Program Document- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
- Program Document
The Controls Guidance and Compliance Failure Points document guides registered entities in assessing risks associated with their business activities and designing appropriate internal controls in response. To help your entity get started, WECC has identified generic control objectives to mitigate the risks associated with the risks associated with CIP-010-4.
Control Objective 1: Maintain an accurate baseline inventory and prevent unauthorized baseline configuration changes. (Asset System Management and Maintenance)
Control Objective 2: Ensure baseline changes do not negatively affect cybersecurity controls. (Asset System Management and Maintenance)
Control Objective 3: Prevent the introduction of malware or counterfeit software. (Identity Management and Access Control)
Control Objective 4: Identify, assess, and mitigate system or asset security vulnerabilities to prevent them from being exploited. (Identity Management and Access Control)
Control Objective 5: Mitigate software vulnerabilities and prevent the introduction of malicious code through the use of Transient Cyber Assets (TCA) or Removable Media (RM). (Identity Management and Access Control)
Program Document- Program Document
- Program Document
Content type
File Type
WECC Document type
- Anchor Data Set (14)
- Charter (26)
- Committee Featured Content (57)
- Common Risk Topic (1)
- Communications (115)
- Daily Status Report (389)
- Event (14)
- Finance (11)
- Initiative (6)
- Meeting Document (2264)
- Other Reports & Data (220)
- Products (45)
- (-) Program (262)
- Reliability Risk Priority (1)
- Standards (641)
Owner group
- Compliance (91)
- Compliance Workshop (1)
- Event Analysis & Situational Awareness (9)
- General & Administrative (17)
- Performance Analysis (9)
- Planning Services (29)
- Registration and Certification (17)
- Resource Adequacy (19)
- System Adequacy Planning (4)
- System Stability Planning (27)
- Training & Education (1)
- WREGIS (37)