{"id":684,"date":"2017-08-11T20:04:44","date_gmt":"2017-08-11T20:04:44","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=684"},"modified":"2021-04-12T02:50:29","modified_gmt":"2021-04-12T02:50:29","slug":"cipv5_cva","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/","title":{"rendered":"CIPv5 CVAs (Cyber Vulnerability Assessment)"},"content":{"rendered":"<p>ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly aligned with regulatory expectations related to CIPv5 CVAs.\u00a0 \u00a0ITEGRITI experts utilize an assessment methodology for our NERC CIP CVAs that leverages the guidance in\u00a0<a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-115\/final\" target=\"_blank\" rel=\"noopener noreferrer\">NIST SP800-115<\/a> and <a href=\"http:\/\/www.nerc.com\/pa\/Stand\/Reliability%20Standards\/CIP-010-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NERC CIP-010-2<\/a>, yet can be tailored to the specific needs of a client&#8217;s environment.\u00a0 Both the methodology and resulting report follow a logical progression and\u00a0provide clear results and actionable recommendations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly aligned with regulatory expectations related to CIPv5 CVAs.\u00a0 \u00a0ITEGRITI experts utilize an assessment methodology for our NERC CIP CVAs that leverages the guidance in\u00a0NIST SP800-115 and NERC CIP-010-2, yet can be tailored [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2181],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CIPv5 CVAs (Cyber Vulnerability Assessment) - kw022024<\/title>\n<meta name=\"description\" content=\"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA&#039;s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIPv5 CVAs (Cyber Vulnerability Assessment)\" \/>\n<meta property=\"og:description\" content=\"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA&#039;s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-11T20:04:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T02:50:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Sanchez\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\"},\"author\":{\"name\":\"Michael Sanchez\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\"},\"headline\":\"CIPv5 CVAs (Cyber Vulnerability Assessment)\",\"datePublished\":\"2017-08-11T20:04:44+00:00\",\"dateModified\":\"2021-04-12T02:50:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\"},\"wordCount\":83,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg\",\"articleSection\":[\"GSD\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\",\"name\":\"CIPv5 CVAs (Cyber Vulnerability Assessment) - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg\",\"datePublished\":\"2017-08-11T20:04:44+00:00\",\"dateModified\":\"2021-04-12T02:50:29+00:00\",\"description\":\"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA's.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg\",\"width\":1200,\"height\":320,\"caption\":\"827302654\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIPv5 CVAs (Cyber Vulnerability Assessment)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\",\"name\":\"Michael Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"caption\":\"Michael Sanchez\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CIPv5 CVAs (Cyber Vulnerability Assessment) - kw022024","description":"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA's.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/","og_locale":"en_US","og_type":"article","og_title":"CIPv5 CVAs (Cyber Vulnerability Assessment)","og_description":"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA's.","og_url":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2017-08-11T20:04:44+00:00","article_modified_time":"2021-04-12T02:50:29+00:00","og_image":[{"width":1200,"height":320,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg","type":"image\/jpeg"}],"author":"Michael Sanchez","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Michael Sanchez"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/"},"author":{"name":"Michael Sanchez","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd"},"headline":"CIPv5 CVAs (Cyber Vulnerability Assessment)","datePublished":"2017-08-11T20:04:44+00:00","dateModified":"2021-04-12T02:50:29+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/"},"wordCount":83,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg","articleSection":["GSD"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/","url":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/","name":"CIPv5 CVAs (Cyber Vulnerability Assessment) - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg","datePublished":"2017-08-11T20:04:44+00:00","dateModified":"2021-04-12T02:50:29+00:00","description":"ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly related to CIPv5 CVA's.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/08\/cyberlockcircle_1200x320.jpg","width":1200,"height":320,"caption":"827302654"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2017\/gsd\/cipv5_cva\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"CIPv5 CVAs (Cyber Vulnerability Assessment)"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd","name":"Michael Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","caption":"Michael Sanchez"},"url":"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/684"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=684"}],"version-history":[{"count":6,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/684\/revisions"}],"predecessor-version":[{"id":1445,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/684\/revisions\/1445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/686"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}