dcsimg

Find an IT Download

Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities.


10.2 MB | 5 files | null PDF

Volume 1 - Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements

Volume 2 - Privacy and the Smart Grid

Volume 3 - Supportive Analyses and References

This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities. Organizations in the diverse community of smart grid stakeholders — from utilities to providers of energy management services to manufacturers of electric vehicles and charging stations — can use the methods and supporting information presented in this report as guidance for assessing risk and identifying and applying appropriate security requirements. This approach recognizes that the electric grid is changing from a relatively closed system to a complex, highly interconnected environment. Each organization's cybersecurity requirements should evolve as technology advances and as threats to grid security inevitably multiply and diversify.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • SmartGridCybersecurityV1.pdf
  • SmartGridCybersecurityV2.pdf
  • SmartGridCybersecurityV3.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More