BES Reliability Operating Services

Improved Essays
Appendix B – BROS Information

PURPOSE:
The following provides information on the “BES Reliability Operating Services” (BROS) noted in this procedure and the CIP-002 standard.

USAGE:
BROS was introduced in the Guidance and Technical Basis section of the CIP-002 standard, and are based on the NERC Reliability Functional Model. The purpose of the BROS is to assist Responsible Entities (i.e. FPL) in the identification services essential to the reliable operation of the BES asset, and the Cyber Assets associated with those essential services.

For CIP-002 the BROS have been identified as:

BROS Name Brief Description
Dynamic Response Includes those actions performed by BES Elements or subsystems which are automatically triggered to initiate a response to a BES condition.
Balancing Load & Generation Includes
…show more content…
The services are considered essential to the operation of the BES asset, so any Cyber Asset associated with those services would be considered essential, and should be evaluated to see if qualifies as a BCA. Below are two (2) examples on how the BROS can be applied to a Cyber Asset to determine if it is essential to the operation of the BES asset.

Example 1:
i. At a generation BES asset, there are protection relays installed at the step-up transformer (GSU) to protect the actual generation unit from line faults which could impact the operation of the units. ii. The relays are considered Cyber Assets and are part of the generation BES assets protection systems. iii. Reviewing the BROS information for Generator Owner (GO) and / or Generator Operator (GOP), the following is found:
• Under the “Dynamic Response” BROS there is the category of: o “Protection Systems (transmissions & generation)”, which has; o “Lines, busses, transformers, generation” and “Current, frequency, speed, phase”

Related Documents

  • Decent Essays

    Nt1330 Unit 9 Paper

    • 74 Words
    • 1 Pages

    I am sharing the overall status of all offices as it relates to Business Continuity refresh with all the Business Continuity Planners and approvers. Allowing you to see the big picture as well as how each office is tracking. Below are two data points representing current-state. We need adhere to the BCP dates as all remote offices are following a set schedule and in order to remain compliant be it audit, security or contractual.…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ap4 Task 5

    • 355 Words
    • 2 Pages

    Pat and Renee, Below are details on the Factory Protection Plan (FFP) provided by Chenega for the micro-turbine: • The FFP is available through a separate contract from the factory and is executed by Chenega Energy. • The original estimate of $13,000 for the FFP was included in the Chenega contract for APP4, but will most likely be deferred to APP5. This annual fee for “Plan C” (see attached), which is a 9 year, parts only plan that includes overhaul of the micro-turbine. It covers all parts, scheduled and unscheduled, for 9 years, and includes the complete replacement of the turbo generator, often between 50,000 and 65,000 hours.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    The BCA List will contain information, including or similar to: 1. BES Cyber Asset Host Name 2. BES Cyber Asset Description 3. BES Cyber Asset Functional…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Background of job duty In an interview I spoke with a woman named Janine Cunningham, a case manager/ Service Coordinator in “Office of Long Term Living” (OLTL) at Lehigh Valley Center for Independent Living, located in Allentown Pa, serving Lehigh and North Hampton County. Talking with her I had received a lot of information on what level of case management she takes part in, the stages, feedback on what HCBS waivers are as well as HCBS ISP and much more. When asked what the office of Long-Term Living is and what exactly they do, Ms. Cunningham had referred to the PA Department of Human Services. It stated, “The majority of people will need assistance with daily activities, such as bathing, dressing and meal preparation, at some point in their lives, whether due to aging, injury, illness or disability.…

    • 1776 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P1 – The impacts that different types of threats have on an organisation Technical Failure A technical failure can be caused for many different situations. Most devices will fail at some point because of some kind of error. There are certain measures that can be put into place to avoid these errors from occurring more often. Such as the training of staff of the device they are using so these issues will become less common and then they will also be to most likely solve the problem also.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Failure Model In Nursing

    • 2663 Words
    • 11 Pages

    Prior to conducting the actual hazard analysis, there are steps to be taken in preparing for the FMEA. First, you must select the process to be examined. In this scenario, it will be the administration of conscious sedation. Secondly, you want to assemble your team of interdisciplinary professionals. As mentioned above, in this scenario, I would assemble a team inclusive of RN’s who are trained in the current process, a physician, a pharmacy representative, a member of risk management and a unit manager.…

    • 2663 Words
    • 11 Pages
    Superior Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    “Secure Firmware Validation and Update for Consumer Devices in Home Networking.” Secure Firmware Validation and Update for Consumer Devices in Home Networking, vol. 62, no. 1, Feb. 2016, pp. 39–44. IEEE Xplore, ieeexplore.ieee.org/document/7448561/authors. Accessed 28 Mar. 2017. Crowley, Michael G, and Michael N Johnstone.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Decent Essays

    I write asking for a second chance! I jumped the gun and took the last quiz, Chapter 13, thinking that they would be similar to the previous ones I took, but unfortunately, I was wrong. For example, Question 4 asks for the two metrics that would be used for the Maximum Tolerable Downtime (MTD), but the book did not mention RTO and RPO, so I did not have any idea what the correct answer was. (I got that answer wrong.) There were other questions that were not mentioned in the book either.…

    • 155 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    What are the key operational indicators necessary to manage effective services to patients in a medical group practice? All group practices should have a quality improvement committee. What can we do to improve the quality of care, reduce the cost of care and increase patient safety in a medical group practice? What types of risk do we need to manage? Finally, how do we improve patient safety?…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Emp Attack Research Papers

    • 1834 Words
    • 8 Pages

    DOD has implemented and standardized EMP engineering solutions that have been well documented since the 1960s the (G.B., PhD 4). The limiting factor in the civilian sector in regards to hardening the power grid against vulnerabilities to EMP, has been the power and energy industries unwillingness to spend the money to correct current deficiencies. The federal government has put forth bills awaiting passage that would allow governmental entities to further study and plan for the EMP threat. Although the bills would allow for further study of this threat they would not allow for any true threat…

    • 1834 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Running head: BIMS COMPARED TO BCAT 1 Brief Interview for Mental Status Compared to Brief Cognitive Assessment Tool Joshua Hall Emporia State University April 30, 2017 BIMS COMPARED TO BCAT 2 Brief Interview for Mental Status Compared to Brief Cognitive Assessment Tool. The primary goal of the study is to determine which instrument is more sensitive in identifying degrees of cognitive functioning. This article is attempting to exemplify the differences between a brief interview for mental status and a brief cognitive assessment tool in a nursing home setting with two hundred twenty nine individuals.…

    • 626 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Safeguarding

    • 1272 Words
    • 6 Pages

    All staff that is on site must hold an appropriate up to date DBS check. This vetting and barring prevents anyone who shouldnâ€TMt be working with vulnerable people/children getting access to them. The school (and other settings) has a duty of care to ensure that all staff are appropriately trained regularly in safeguarding, and understand fully the process with reporting and recording disclosures for that particular setting. Within these settings there is a structure of safeguarding leaders who will ultimately lead on dealing with any issues brought forward, however if a the staff handing the information over isnâ€TMt happy with how it is dealt with they are fully supported to call into the local authorities multi agency screening service.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Business Continuity Management (BCM) – Key Performance Indicators (KPI's) By: Arunkumar Durairaj 14-Nov-16 1. Introduction The purpose of BCM KPI's are to monitor and measure the performance of Business Continuity Management(BCM) program based on the refernces obtained through achivement of processes or goals . These indicators are used to help organization evaluate its progress and / or performance (in terms of efficiency, effectiveness, robustness, and so on) of its BCM processes while pursuing short term, medium term and / or long-term goals / plans.…

    • 1403 Words
    • 6 Pages
    Improved Essays