{"id":61742,"date":"2017-06-22T08:35:50","date_gmt":"2017-06-22T12:35:50","guid":{"rendered":"https:\/\/www.cyberark.com\/nerc-cip\/"},"modified":"2020-11-06T12:21:16","modified_gmt":"2020-11-06T17:21:16","slug":"nerc-cip","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/nerc-cip\/","title":{"rendered":"NERC CIP"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;NERC CIP&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD WHITE PAPER&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|||&#8221; el_class=&#8221;cyb-button large event-click&#8221; el_id=&#8221;NERC CIP Page: Download Whitepaper&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1538259099844{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;][vc_column_text]<\/p>\n<h4>Secure privileged and remote access to the electric grid and utilities<\/h4>\n<p>For energy utilities, meeting NERC compliance for privileged accounts can be demanding due to the size and complexity of Industrial Control Systems. Adding to the challenge, version 5 of the standard expands the scope to include new elements and requirements around the use of privileged accounts in critical cyber entities.<\/p>\n<p>With CyberArk, electric utilities can put the solutions in place to meet the NERC compliance for privileged access control, remote access management and access revocation.\u00a0 In Industrial Control Systems (ICS), <a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/privileged-session-manager\/\">CyberArk Privileged Account Security<\/a> protects both internal access as well as remote vendor access, allowing all parties to connect to target systems securely, without disclosing the privileged account credential and introducing new risks to the organization. <a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/privileged-session-manager\/\">The solution<\/a> integrates with a range of systems, devices and applications in the organization, creating accountability, operational efficiency and a tamper-proof audit trail across the entire industrial control infrastructure.<\/p>\n<p><strong>Key Benefits<\/strong>:<\/p>\n<ul>\n<li>Achieve NERC CIP compliance by ensuring accountability for every use of privileged or shared accounts<\/li>\n<li>Secure remote access for external contractors with \u201cover the shoulder\u201d<a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/privileged-session-manager\/\"> real-time session monitoring<\/a><\/li>\n<li>Record every privileged session for context-based playback<\/li>\n<li><a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/privileged-session-manager\/\">Isolate privileged sessions<\/a> from targeted and sophisticated attacks without exposing the privileged credential<\/li>\n<li>Secure privileged credentials and session recordings in a tamper-proof and patented <a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/\">Digital Vault<\/a><\/li>\n<li>Centrally enforce policies and access workflows which are flexible enough to meet diverse business processes<\/li>\n<li>Audit and track every privileged account and activity with built-in or customized reports<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1537546226715{padding-top: 2rem !important;}&#8221;][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;5\/6&#8243; css=&#8221;.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}&#8221;][vc_custom_heading text=&#8221;RESOURCES&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;cyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column css=&#8221;.vc_custom_1537546542206{padding-bottom: 3.125rem !important;}&#8221; el_class=&#8221;cyb-center&#8221;][vc_btn title=&#8221;MORE RESOURCES&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#414042&#8243; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2F|||&#8221; el_class=&#8221;cyb-button&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/CYB_GEN_Hero_2880x1536.jpg) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;NERC CIP&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_btn title=&#8221;DOWNLOAD WHITE PAPER&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fprotecting-the-grid-addressing-nerc-cip-requirements-for-securing-privileged-access|||&#8221; el_class=&#8221;cyb-button large event-click&#8221; el_id=&#8221;NERC CIP Page: Download&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":42102,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-61742","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NERC CIP Compliance: CyberArk PAM for NERC CIP<\/title>\n<meta name=\"description\" content=\"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NERC CIP\" \/>\n<meta property=\"og:description\" content=\"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-06T17:21:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\",\"name\":\"NERC CIP Compliance: CyberArk PAM for NERC CIP\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T12:35:50+00:00\",\"dateModified\":\"2020-11-06T17:21:16+00:00\",\"description\":\"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NERC CIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NERC CIP Compliance: CyberArk PAM for NERC CIP","description":"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","og_locale":"it_IT","og_type":"article","og_title":"NERC CIP","og_description":"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.","og_url":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-11-06T17:21:16+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","url":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/","name":"NERC CIP Compliance: CyberArk PAM for NERC CIP","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T12:35:50+00:00","dateModified":"2020-11-06T17:21:16+00:00","description":"CyberArk solutions for utility companies provide secure privileged and remote access to the electric grid and utilities to meet NERC CIP compliance.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/federal-government-solutions__trashed\/nerc-cip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"NERC CIP"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/61742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=61742"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/61742\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42102"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=61742"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=61742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}