Transient Cyber Asset Program
NERC CIP Compliant Transient Cyber Asset Solution
Increasingly, field personnel are at the forefront of the defense against cyber threats. Due to their regular contact with critical assets, the laptops and tablets they use to work with the assets need to be secured. Such transient devices can move between electronic security perimeters and could spread malware across the critical infrastructure. NERC CIP Transient Cyber Asset (TCA) requirements were put forth to prevent this from happening.
Due to the unique nature of the maintenance and testing tasks in the field, truly securing such devices and complying with the NERC CIP Transient Cyber Asset requirements is challenging. All too often, the security measures prevent work from getting done. A more effective security and compliance approach for the field devices is to start with the work processes that need to be protected and tailor security controls to them.
Doble Transient Cyber Asset Program is a holistic solution that is built upon our keen understanding of utility field work processes and challenges. Doble Transient Cyber Asset Program consists of multiple, versatile security controls that can be chosen and configured to best fit the utility’s needs, while complying with NERC CIP Transient Cyber Asset requirements. This customizable approach will also help you simplify testing, automate data processes, improve efficiency and streamline business processes – from the field to the office. As part of the Doble Transient Cyber Asset Program, ultra-rugged Doble Universal Controllers (DUCs) we offer meet or exceed NERC CIP-10-2 requirements, operate test systems universally, and comply with NERC CIP-3-2 requirements regarding removeable media, and follow the least permission model to lock-down ports and functionality to only specific purposes needed to complete maintenance on devices in protected cyber systems.