Rfp Task 5

Improved Essays
Project Details

This scope of work document is targeted to allow the Supplier to provide a quote for a five year services proposal that is focused in the area of support for NERC CIP. The services described below will be quoted for the application to the cyber devices that exist in NextEra Power Plants that are subject to the NERC CIP Version 6 regulations. The Supplier will provide their rates for the execution of the services work described below and will provide a range of qualification levels that would be needed to execute each of the tasks described below as part of the Supplier response to the NextEra RFP. (11 Tasks)

TASK 1: PROJECT MANAGEMENT SUPPORT AND ADMINISTRATION

The Supplier will provide project management services for
…show more content…
Integrate schedules provided by the OEM project teams, as led by the appropriate NextEra PGD I&C Fleet Team Project Engineer; this includes the schedule from the DCS OEM’s.

2. Integrate schedules provided by the Physical Security project team, as led by the appropriate FPL Corporate Security (CS) Project Lead. This includes schedules from the contractor selected to implement the Physical Security Perimeter (PSP) installation, configuration and testing.

3. Integrate schedules provided by the Information Management (IM) project team, as led by the appropriate NextEra IM Project Manager. This includes schedules from IM and the cable installation vendor.

4. Integrate security upgrade project activities with the site outage schedule as provided by the NextEra PGD Central Maintenance team.

5. Review schedule with NextEra Project Director on a weekly basis, identifying critical path progress and any issues with tasks that are becoming or are late.

6. Work with NextEra Project Director and Project teams to develop and implement plans for remediation of any late tasks that impact overall schedule critical path.

7. Coordinate Requests for Information (RFI) between the different NextEra business
…show more content…
• Copies of relevant configuration, network and system topology documentation.

• Access to relevant internal and external systems as needed.

TASK 2: BES CYBER ASSET, BES CYBER SYSTEM, SECURE ARCHITECTURE DESIGN (CYBER)
& PHYSICAL SECURITY DRAWING

The Supplier will develop the NERC CIP project BCA List based upon the NextEra NERC CIPFPL CIP-002-6 procedures defining the NextEra BES Assets, the proposed Electronic Security Perimeter (ESP) design, the IM Corporate Controls Network design and the OEM system designs.

Developing the BCA List may include the following activities (as required):

1. Finalize the inventory of cyber assets associated with the NERC CIP Bright line and other Criteria
2. Review vendor supplied documentation
3. Conduct a final system review and walk through with qualified client representative
4. Create Engineering Analysis document, including NERC CIP low impact BES Cyber Systems

NextEra will provide a template for the BCA List in Excel format. The BCA List will contain information, including or similar to:

1. BES Cyber Asset Host Name
2. BES Cyber Asset Description
3. BES Cyber Asset Functional

Related Documents

  • Decent Essays

    Hrm/531 Week 2

    • 556 Words
    • 3 Pages

    Late payment of vendor invoices, which means late fees and lost cash discounts: The help with the new ERP Mal-Bal will be able to make payments to vendors in time for the system can integrate with the inventory purchased from the stores department. Late deliveries to customers: The old software integration of data is a problem and in order to make timely deliveries and the purchase order will be received by the marketing needs to be marked to material dispatch section in time. The lack of which will result in a delay of deliveries. Growth in inventories, accompanied by an increase in stockouts: Integration of data and lack of availability of information to employees will result in stock in hand not matching with the product demand and purchase department may…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (TCO C) A project to remodel an office area has the following activities. (Hint: You will need to build an AIB diagram, perform a forward pass, and perform a backward pass to answer this question.) ............... a) What are the critical path activities? (5 points) b) What is the project's scheduled completion time?…

    • 961 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark continues to develop and innovate. The company holds several patents the most valuable being the first issued in 2002 for the “Network Vaults” (US6356941, 2002) providing a very narrow single channel to securely store, and exchange information. Other Patents include technology for Monitoring session traffic, Doing Correlation analysis for risk assessment, unauthorized target analysis to detect access breaches, and a system to protect publication of sensitive documents within an…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    egaproject Paradox Issues in the O&M Phase of a Megaproject The occurrence of "The Megaproject Paradox" and issues associated with its occurrence, are not limited to the Execution Phase of a Megaproject's Life Cycle. In this article, an analysis of the impact of "The Megaproject Paradox" occurring in the Operations and Maintenance Phase of the Life Cycle of a complex Megaproject, the Australian National Electricity Market (NEM) is considered. It is recommended that Parts 1, 2.1 and 2.2 are preparatory reading to fully comprehend Part 2.3 (this article).…

    • 314 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Summary: Capstone Project

    • 522 Words
    • 3 Pages

    Capstone Project Summary This project will be to develop an overall written as well as a lab tested environment concept plan for a live implementation for a government contract. There is a need to lessen the number of running hardware services, implement high level security access for both physical access as well as any needed remote connections, to lessen the overall possible attack surfaces for the environment from potential attackers, make this a unilateral implementation anywhere, as well as follow and apply any and all Security Technical Implementation Guides (STIGs). We will be convert an older antiquated hardware server environment that is coming to end of life and will be in need up replacement or upgrade.…

    • 522 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Capstone Project Essay

    • 752 Words
    • 4 Pages

    I based my capstone project on a network upgrade and redesign project my company completed to update the local area network (LAN) from Gigabit Ethernet to Ten Gigabit Ethernet. The project was inspired by my company’s decision to virtualize its data center, update its physical security system, and expand its passenger processing system. All these technologies require a robust network to.... Additionally, the network firewalls were outdated and lacking security features that protects the network against current cyber threats. Obviously, I create a fictitious company to present the project in the paper.…

    • 752 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On September 21, 2015, Ms. Sophia Martinez approved the topic of researching and addressing the problem of mandating the purchase of an overpriced dining plan provided by Texas A&M University (TAMU) to students living on campus. To be in accordance with the dining services on campus, there are numerous innovative selections to accommodate the availability of dining options for students living on campus. Some of these options are in five different type of blocks ranging from 90 to 240 meal trades and about 300 to 500 dining dollars per semester. The price of dining options can range from $1,300 to $2,100 per semester not including tax.…

    • 844 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Continuous Process Improvement (CPI) methods and tools, used by the Department of Defense and the Department of the Navy increase readiness and utilize resources more efficiently and effectively. CPI integrates best business practices with tools most commonly used in the industry today. Many of you will use the tools of CPI in your daily work. The three process improvement tools include Lean, Six Sigma, and The Theory of Constraints. In order to conduct a successful project, the team will have to follow strict guidelines every step of the way.…

    • 582 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Getronics continually maintains fixate on the cessation utilizer and provides clients with a cessation-to-end vision through orchestrating, design and implementation of infrastructure solutions. Getronics withal has vigorous project management capabilities across all areas of their portfolio. Their experienced teams provide full support to customers during intricate IT projects and…

    • 50 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Overview of Border 2020 The Border 2020 project will effectively improve air quality, provide clean, safe drinking water to residents, reduce waste, and prepare both the U.S and Mexico for environmental response, and stewardship. The Border 2020 project was created under the La Paz (The Peace) agreement in 1983 . Building off the border 2012 project, the latest edition will break into a two year plan, conquering each goal. The E.P.A and SEMARNAT, as well as other local governments, encourage the community to be actively involved. Project responsibilities are broken down into 3 networks.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Defining Homeland Security Homeland security (HLS) is an expansive enterprise that includes many agencies and departments at all levels of government. As such, it has been defined in many different but similar ways. For example, in their book Understanding Homeland Security, Noftsinger, Newbold, and Wheeler (2007) define homeland security as “a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, minimize the damage, and recover from attacks that do occur” (pp. 29-30). In its 2010 Quadreannial Homeland Security Review Report, the Department of Homeland Security (DHS) similarly defined HLS as “a concerted national effort to ensure a homeland that is safe, secure, and…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    DESIGN A decision has been reached by individual(s) with responsibility to effect change in order for an organisation to remain competitive and flourish. Plan. In order to start the process a proposal (business case) needs to be produced. This would identify the issues that need to be addressed, cost implications, who should be directly involved with the project and the potential outcome and benefits.…

    • 737 Words
    • 3 Pages
    Improved Essays