{"id":16325,"date":"2020-03-10T14:00:56","date_gmt":"2020-03-10T17:00:56","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16325"},"modified":"2020-03-10T11:57:04","modified_gmt":"2020-03-10T14:57:04","slug":"guide-to-the-distributed-energy-resources-cybersecurity-framework","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/guide-to-the-distributed-energy-resources-cybersecurity-framework\/","title":{"rendered":"Guide to the Distributed Energy Resources Cybersecurity Framework"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16326\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/03\/guide-to-the-distributed-energy-resources-cybersecurity-framework.jpg\" alt=\"Guide to the Distributed Energy Resources Cybersecurity Framework\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/03\/guide-to-the-distributed-energy-resources-cybersecurity-framework.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/03\/guide-to-the-distributed-energy-resources-cybersecurity-framework-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Charisa Powell, Konrad Hauck, Anuj Sanghvi, Adarsh Hasandka, Joshua Van Natta, and Tami Reynolds<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition National Renewable Energy Laboratory<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> In May 2018, the U.S. Department of Energy (DOE) released its Cybersecurity Strategy (DOE 2018), a multiyear plan specifically regarding cybersecurity in the energy sector. The framework outlined in this report aligns with strategies identified in the DOE cybersecurity strategy to deliver cybersecurity solutions and continually improve cybersecurity posture. Researchers from federal facilities and industry can now make use of this framework, the Distributed Energy Resources Cybersecurity Framework (DERCF), through a web-based application. The application presents users with questions regarding their organization\u2019s security controls, practices pertaining to the use of such controls, and application to distributed energy resources (DERs) in the following categories:<\/p>\n<ul>\n<li>Cyber governance<\/li>\n<li>Cyber-physical technical management<\/li>\n<li>Physical security of DER devices.<\/li>\n<\/ul>\n<p>DERs contribute to increased connectivity within energy systems and their components, thus increasing the attack surface that a threat actor can target. A standardized procedure to assess DER cybersecurity falls behind the rapid pace of DER adoption. The DERCF web application will draw from users\u2019 responses to generate a score that gauges the current state of DER cybersecurity in organizations and prioritizes recommended action items to help improve an organization\u2019s security controls and practices.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/03\/guide-to-the-distributed-energy-resources-cybersecurity-framework.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charisa Powell, Konrad Hauck, Anuj Sanghvi, Adarsh Hasandka, Joshua Van Natta, and Tami Reynolds Maison d&#8217;\u00e9dition National Renewable Energy Laboratory R\u00e9sum\u00e9: In May 2018, the U.S. Department of Energy (DOE) released its Cybersecurity Strategy (DOE 2018), a multiyear plan specifically regarding cybersecurity in the energy sector. The framework outlined in this report aligns with strategies identified in the DOE cybersecurity strategy to deliver cybersecurity solutions and continually improve cybersecurity posture.&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16326,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,20,25,112],"tags":[],"class_list":["post-16325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-da-informacao","category-seguranca-publica-e-defesa","category-download"],"views":236,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16325"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16325\/revisions"}],"predecessor-version":[{"id":16327,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16325\/revisions\/16327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16326"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}