010-4-Cyber Security: Configuration Change Management and Vulnerability Assessments

In the Reports Portal, select Repository > Standard Content > NERC> CIP-010 Configuration Change Management and Vulnerability Assessments.

This standard determines how you manage configuration changes and track vulnerabilities to protect your BES cyber system from unauthorized changes, ensuring that your organization supports and maintains appropriate cyber security requirements for your organization.

Dashboards Reports

Configuration Changes Overview

Vulnerability Overview

n/a

Configuration Changes Overview

Provides an overview of configuration changes found on the organization.

Charts:

  • Configuration Changes
  • Configuration Changes by User
  • Configuration Changes by Host
  • Trends
  • Events Table

Filters:

  • Device Vendor, Product, and Signature ID
  • Agent Severity

 

Vulnerability Overview

Provides information to help you track vulnerabilities reported in your enterprise.

Charts:

  • Vulnerable Activity Relationship
  • Reported Vulnerabilities
  • Vulnerable Systems
  • Trends
  • Events Table

Filters:

  • Device Vendor, Product, and Signature ID
  • Agent Severity