Utilizing the NERC cip checklist helps your company protect its technology based assets information. The cip checklist divides requirements into physical, personnel, and electronic security to easily break down the steps that must be taken for optimum security measures.
The cip checklist is a concise document that clearly outlines the steps that must be taken to ensure secure perimeters for all network-based assets. Required steps require implementing network security, training all personnel who will have access to sensitive information about proper security procedures, and performing background investigations for all employees whose jobs will require them to have access to this data. It also covers annual auditing and access control measures.
Although the document is short, it provides a comprehensive overview of all steps required to provide minimum security measures to protect financial and intellectual assets. Adhering to these guidelines is one way to make sure that those in charge of security measures use the same process to avoid missing any critical steps.