Skip to main content
An official website of the United States government
The .gov means it's official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site.
The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Search:
Agenda
Reg Review
ICR
This script is used to control the display of information in this page.
Display additional information by clicking on the following:
All
Brief and OIRA conclusion
Abstract/Justification
Legal Statutes
Rulemaking
FR Notices/Comments
IC List
Burden
Misc.
Common Form Info.
Certification
View Information Collection (IC) List
View Supporting Statement and Other Documents
Please note that the OMB number and expiration date may not have been determined when this Information Collection Request and associated Information Collection forms were submitted to OMB. The approved OMB number and expiration date may be found by clicking on the Notice of Action link below.
View ICR - OIRA Conclusion
OMB Control No:
1902-0248
ICR Reference No:
201810-1902-007
Status:
Historical Active
Previous ICR Reference No:
201804-1902-007
Agency/Subagency:
FERC
Agency Tracking No:
FERC-725B
Title:
FERC-725B, (Final Rule in RM17-13-000) Supply Chain Risk Management Reliability Standards
Type of Information Collection:
Revision of a currently approved collection
Common Form ICR:
No
Type of Review Request:
Regular
OIRA Conclusion Action:
Approved without change
Conclusion Date:
12/21/2018
Retrieve Notice of Action (NOA)
Date Received in OIRA:
10/29/2018
Terms of Clearance:
In accordance with 5 CFR 1320, the information collection is approved.
Inventory as of this Action
Requested
Previously Approved
Expiration Date
12/31/2021
36 Months From Approved
06/30/2021
Responses
223,362
0
222,882
Time Burden (Hours)
1,996,520
0
1,928,744
Cost Burden (Dollars)
0
0
0
Abstract:
The Final Rule in RM17-13-000 approves Reliability Standards CIP-005-6, CIP-010-3, and CIP-013-1. The Reliability Standards CIP-013-1 (Cyber Security – Supply Chain Risk Management), CIP-005-6 (Cyber Security --- Electronic Security Perimeters(s)), and CIP-010-3 (Cyber Security --- Configuration Change Management and Vulnerability Assessments) are to be used by NERC registered entities to mitigate cybersecurity risks associated with the supply chain for high and medium impact BES Cyber Systems. The NERC Compliance Registry, as of December 2017, identifies approximately 1,250 unique U.S. entities that are subject to mandatory compliance with Reliability Standards. Of this total, we estimate that 288 entities will face an increased paperwork burden under the approved Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3. This Final Rule is being submitted in the FERC-725B information collection (OMB Control No. 1902-0248). The RM17-13-000 NOPR was submitted in the FERC-725B1 information collection due to the FERC-725B information collection being under review for an unrelated activity at the time. Due to NOPR and Final Rule being submitted in different collections, FERC staff must submit this ICR with the Stage of Rulemaking field set as "not associated with rulemaking". Additionally, the NOPR and Final Rule citations and dates are included in the 60 and 30-day notice fields respectively.
Authorizing Statute(s):
PL:
Pub.L. 109 - 58 1211, Title XII, Subtitle A
Name of Law: Energy Policy Act of 2005
US Code:
18 USC 824o
Name of Law: Federal Power Act
Citations for New Statutory Requirements:
None
Associated Rulemaking Information
RIN:
Stage of Rulemaking:
Federal Register Citation:
Date:
Not associated with rulemaking
Federal Register Notices & Comments
60-day Notice:
Federal Register Citation:
Citation Date:
83 FR 3433
01/25/2018
30-day Notice:
Federal Register Citation:
Citation Date:
83 FR 53992
10/26/2018
Did the Agency receive public comments on this ICR?
No
Number of Information Collection (IC) in this ICR:
6
IC Title
Form No.
Form Name
FERC-725B, Mandatory Reliability Standards for Critical Infrastructure Protection
RM17-11-000 Final Rule (Reliability Standard CIP-003-7) (one-time averaged Years 1-3)
RM17-11-000 Final Rule (Reliability Standard CIP-003-7) (ongoing)
RM17-13-000 Final Rule (Reliability Standard CIP-013-1 R1) (one-time averaged over Years 1-3)
RM17-13-000 Final Rule (Reliability Standard CIP-013-1 R1-R4) (one-time averaged over Years 1-3)
RM17-13-000 Final Rule (Reliability Standard CIP-013-1 R2) (ongoing)
ICR Summary of Burden
Total Approved
Previously Approved
Change Due to New Statute
Change Due to Agency Discretion
Change Due to Adjustment in Estimate
Change Due to Potential Violation of the PRA
Annual Number of Responses
223,362
222,882
0
480
0
0
Annual Time Burden (Hours)
1,996,520
1,928,744
0
67,776
0
0
Annual Cost Burden (Dollars)
0
0
0
0
0
0
Burden increases because of Program Change due to Agency Discretion:
Yes
Burden Increase Due to:
Miscellaneous Actions
Burden decreases because of Program Change due to Agency Discretion:
No
Burden Reduction Due to:
Short Statement:
As the Commission previously recognized, the global supply chain provides the opportunity for significant benefits to customers, including low cost, interoperability, rapid innovation, a variety of product features and choice. However, the global supply chain also enables opportunities for adversaries to directly or indirectly affect the management or operations of companies that may result in risks to end users. Supply chain risks may include the insertion of counterfeits, unauthorized production, tampering, theft, or insertion of malicious software, as well as poor manufacturing and development practices. The supply chain risk management Reliability Standards submitted by NERC constitute substantial progress in addressing the supply chain cyber security risks identified by the Commission. NERC registered entities that operate applicable systems listed in Reliability Standards CIP-013-1, CIP-005-6, and CIP-010-3 must develop and implement: -one or more method(s) for determining active vendor remote access sessions; -one or more method(s) to disable active vendor remote access; -a method to verify the identity of the software source; and the integrity of the software obtained from the software source when the method to do so is available; -one or more documented supply chain cyber security risk management plan(s) for high and medium impact BES Cyber Systems which must address as applicable; --Notification by the vendor of vendor-identified incidents related to the products or services provided to the Responsible Entity that pose cyber security risk to the Responsible Entity; --Coordination of responses to vendor-identified incidents related to the products or services provided to the Responsible Entity that pose cyber security risk to the Responsible Entity; --Notification by vendors when remote or onsite access should no longer be granted to vendor representatives; --Disclosure by vendors of known vulnerabilities related to the products or services provided to the Responsible Entity; --Verification of software integrity and authenticity of all software and patches provided by the vendor for use in the BES Cyber System; --Coordination of controls for: ---vendor-initiated Interactive Remote Access; ---system-to-system remote access with a vendor(s) --Each Responsible Entity shall implement its supply chain cyber security risk management plan(s).
Annual Cost to Federal Government:
$4,931
Does this IC contain surveys, censuses, or employ statistical methods?
No
Does this ICR request any personally identifiable information (see
OMB Circular No. A-130
for an explanation of this term)? Please consult with your agency's privacy program when making this determination.
No
Does this ICR include a form that requires a Privacy Act Statement (see
5 U.S.C. §552a(e)(3)
)? Please consult with your agency's privacy program when making this determination.
No
Is this ICR related to the Affordable Care Act [Pub. L. 111-148 & 111-152]?
No
Is this ICR related to the Dodd-Frank Wall Street Reform and Consumer Protection Act, [Pub. L. 111-203]?
No
Is this ICR related to the American Recovery and Reinvestment Act of 2009 (ARRA)?
No
Is this ICR related to the Pandemic Response?
Uncollected
Agency Contact:
Simon Slobodnik 202 502-6707 simon.slobodnik@ferc.gov
Common Form ICR:
No
On behalf of this Federal agency, I certify that the collection of information encompassed by this request complies with 5 CFR 1320.9 and the related provisions of 5 CFR 1320.8(b)(3).
The following is a summary of the topics, regarding the proposed collection of information, that the certification covers:
(a) It is necessary for the proper performance of agency functions;
(b) It avoids unnecessary duplication;
(c) It reduces burden on small entities;
(d) It uses plain, coherent, and unambiguous language that is understandable to respondents;
(e) Its implementation will be consistent and compatible with current reporting and recordkeeping practices;
(f) It indicates the retention periods for recordkeeping requirements;
(g) It informs respondents of the information called for under 5 CFR 1320.8 (b)(3) about:
(i) Why the information is being collected;
(ii) Use of information;
(iii) Burden estimate;
(iv) Nature of response (voluntary, required for a benefit, or mandatory);
(v) Nature and extent of confidentiality; and
(vi) Need to display currently valid OMB control number;
(h) It was developed by an office that has planned and allocated resources for the efficient and effective management and use of the information to be collected.
(i) It uses effective and efficient statistical survey methodology (if applicable); and
(j) It makes appropriate use of information technology.
If you are unable to certify compliance with any of these provisions, identify the item by leaving the box unchecked and explain the reason in the Supporting Statement.
Certification Date:
10/29/2018