Your Roadmap to CIP‑015: Navigating the Next Big NERC Standard

The electric grid is the backbone of modern society—yet it remains a persistent target for increasingly sophisticated cyber adversaries. While utilities have significantly strengthened perimeter defenses, attackers have evolved too, adopting stealthy techniques that bypass barriers and move laterally across internal networks.

To counter this growing risk, the North American Electric Reliability Corporation (NERC) has introduced CIP‑015‑1, a transformational standard that requires utilities to implement Internal Network Security Monitoring (INSM) within the Electronic Security Perimeter (ESP). This marks a crucial shift from perimeter‑focused (north‑south) visibility to deep, internal (east‑west) monitoring and threat detection.

This blog breaks down what CIP‑015‑1 means, why it matters, and how utilities can begin preparing today.

The Hidden Gap in Grid Security—And Why CIP‑015 is the Answer

For years, NERC CIP standards focused primarily on establishing secure perimeters around critical assets. But modern threat actors have demonstrated they can:

  • Use living‑off‑the‑land techniques
  • Compromise remote access mechanisms
  • Exploit supply‑chain vulnerabilities
  • Move laterally across operational networks

These tactics expose a serious blind spot: limited visibility inside the ESP itself.

Recognizing this gap, FERC Order 887 directed the creation of CIP‑015. The order sets out three core security objectives:

  • Build baselines of internal network behavior
  • Detect unauthorized or abnormal activity
  • Protect logs so they cannot be altered or destroyed

In effect, CIP‑015 shifts utilities from relying purely on prevention to adopting detective and forensic‑capable controls.

What CIP‑015‑1 Requires: The Capabilities You Must Build

CIP‑015‑1 outlines three major requirement areas critical to internal monitoring maturity.

1. Build Deep Internal Visibility (R1: Monitoring)
Utilities must establish a comprehensive internal monitoring program, including:

  • Data Collection (R1.1): Deploy network data feeds that capture internal activity
  • Anomaly Detection (R1.2): Use monitoring data to identify suspicious or abnormal patterns
  • Threat Evaluation (R1.3): Analyze anomalies to determine whether they represent real threats

This requires not only technology but deep knowledge of OT traffic flows and baseline behavior.

2. Retain the Evidence You Need (R2: Data Retention)
Utilities must preserve INSM‑related data long enough to support:

  • Investigations
  • Regulatory reporting (including CIP‑008‑6 incident response requirements)
  • Forensic analysis

Storage planning becomes essential as data volumes grow with improved detection fidelity.

3. Protect Monitoring Data from Tampering (R3: Data Protection)
All monitoring, detection, and analysis data must be safeguarded from:

  • Unauthorized access
  • Manipulation or corruption
  • Deletion (accidental or malicious)

This frequently requires segregated data stores, hardened infrastructure, strong access controls, and redundancy.

The Tech Stack Behind CIP‑015 Compliance

To meet CIP‑015, utilities must build or adopt solutions capable of:

  • Deep packet inspection with OT‑specific protocol insight
  • Internal traffic mapping and asset discovery
  • Baseline and anomaly detection models
  • Behavioral and indicator‑based detection
  • Forensic‑grade data storage and analysis

Industry‑leading platforms like Dragos, Nozomi Networks, Claroty, Cisco Cyber Vision, and Fortinet OT Security already offer many of these capabilities.

Your Action Plan: How Utilities Should Begin Preparing Now

Even with long compliance dates, early preparation is essential. A practical implementation journey includes:

1. Start with Foundation‑Building Tasks

  • Review all High/Medium Impact systems with ERC
  • Assess existing monitoring and detection maturity
  • Map sensor‑ready points within the network
  • Begin evaluating vendor solutions
  • Define where and how anomalies will be analyzed

2. Build the Next Layer of Readiness

  • Upskill teams on OT‑specific analytics
  • Conduct testing in controlled environments
  • Develop playbooks and triage workflows
  • Establish long‑term storage and protection standards
  • Prepare for expanded coverage under CIP‑015‑2

3. Sustain and Strengthen Over Time

  • Participate in NERC drafting and working groups
  • Monitor changing interpretations and guidance
  • Continuously tune detection models
  • Explore FERC’s cybersecurity incentive programs
How Infosys Supports Your CIP‑015 Journey

We bring deep OT cybersecurity expertise with services that include:

  • Strategic Planning: Readiness assessments, roadmaps, budget planning
  • Technical Implementation: Solution evaluation, deployment, architecture design
  • Process Engineering: Playbooks, workflows, documentation, evidence collection
  • Training & Support: Workforce enablement, ongoing monitoring support
  • End‑to‑End CIP Compliance Management
  • Infosys helps utilities not only achieve compliance but elevate their broader cybersecurity posture.
Final Thoughts: Turning Compliance into Cyber Resilience

CIP‑015 represents the future of cybersecurity for the electric sector. By moving beyond traditional perimeter defenses, it unlocks a deeper understanding of what is happening inside critical infrastructures—where modern attacks often hide.

With early preparation, the right partners, and strong execution, utilities can convert this regulatory requirement into a long‑term strategic advantage, reducing risk and enhancing resilience across the grid.

Read more: Point of View – NERC CIP-015: Monitoring Deep Inside Critical Networks to Keep Adversaries Outside

 

Author Details

Michel Bruggeman

Michel Bruggeman is a seasoned cybersecurity executive with over 25 years of international experience, specializing in Operational Technology (OT) and Internet of Things (IoT) security. As Head of IoT/OT for the EMEA region and Lead for Security Consulting & Advisory at Infosys Cybersecurity, he provides strategic leadership in cybersecurity architecture, risk management, and regulatory compliance, aligned with globally recognized frameworks including ISA/IEC 62443, NIST 2.0, ISO/IEC 27001, DORA/NIS2 and TISAX. Michel has a proven track record in securing mission-critical and industrial environments, enabling secure IT/OT convergence, and delivering cyber-resilience programs for complex, multinational organizations. He is a trusted advisor to executive leadership, known for translating technical risk into business-relevant insights and driving measurable improvements in organizational cybersecurity maturity. Core Competencies: Strategic Leadership: IoT/OT security strategy, executive cybersecurity advisory, regional cybersecurity leadership. Team Development: Building and mentoring high-performing cybersecurity teams across EMEA. Compliance & Risk Management: Expertise in global cybersecurity regulatory frameworks including IEC 62443, ISO 27001, NIST, DORA, and NIS2. Incident Response Leadership: Certified Cyber Incident Leader with a proactive approach to incident management and mitigation. Technical Advisory: Advanced security architecture, vulnerability management, threat intelligence, and cybersecurity response planning and Cyber Resilience. Certifications & Awards: GIAC Cyber Incident Leader (GCIL) GIAC Certified Professional (28+ certifications) ICS2 CISSP, ISACA CISA, ISA IEC-62443 SANS Institute and ISA Mentor/Instructor Microsoft Certified Trainer Dragos Approved Partner Solutions Architect, Claroty Cybersecurity Analyst

Leave a Comment

Your email address will not be published. Required fields are marked *