Internal Network Security Monitoring
The North American electric sector has been working towards new regulatory requirements for internal network security monitoring. As cyber threats evolve and regulatory requirements tighten, electric utilities must adopt robust strategies to secure their internal networks.
What is Internal Network Security Monitoring?
Internal Network Security Monitoring (INSM) involves the continuous observation and analysis of network traffic within an organization’s internal infrastructure. For electric utilities, INSM is a critical component of cybersecurity strategy, focusing on detecting anomalous activities that may indicate potential threats or vulnerabilities within trusted network zones.
Why Electric Utilities Should Start INSM Planning Now
As cyber threats become more sophisticated and regulatory requirements more stringent, implementing robust INSM strategies is crucial for protecting critical infrastructure and ensuring the reliability of the bulk electric system.
Early adoption of INSM not only ensures compliance but also provides a competitive advantage in terms of cybersecurity readiness. By partnering with industry leaders like Dragos and taking proactive steps towards INSM implementation, electric utilities can stay ahead of threats, ensure compliance, and safeguard their operations for years to come.
Benefits of INSM
Implementing INSM offers several advantages for electric utilities:

Enhanced Threat Detection
INSM allows for early identification of potential security breaches, malware infections, or insider threats by monitoring east-west traffic within trusted zones.

Improved Incident Response
With real-time monitoring, utilities can respond swiftly to security incidents, minimizing potential damage and downtime.

Regulatory Compliance
INSM helps utilities meet evolving regulatory requirements, particularly those set by NERC CIP standards.

Asset Protection
By monitoring internal network activities, utilities can better protect critical assets and sensitive data from unauthorized access or manipulation.

Operational Visibility
INSM provides valuable insights into network behavior, helping utilities optimize their infrastructure and identify potential operational issues.

Early Adopter Incentives
FERC Order No. 893 provides deferred cost recovery incentives to help utilities invest in advanced cybersecurity technology, offering quicker financial returns.
Regulatory Outlook: The Future of the NERC CIP Standards
Achieving NERC CIP Compliance requires a comprehensive approach to internal network security. The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards are designed to ensure the reliability and security of the bulk electric system. With the introduction of CIP-015, INSM has become a focal point for compliance efforts.
NERC CIP-015 specifically addresses Internal Network Security Monitoring requirements for High and Medium Impact Bulk Electric System (BES) Cyber Systems.
Key aspects of these requirements include:
- Monitor: Implement, using a risk-based rationale, network data feed(s) to monitor network activity; including connections, devices, and network communications. (R1.1)
- Detect: Implement one or more method(s) to detect anomalous network activity using the network data feed(s) from Part 1.1. (R1.2)
- Analyze: Implement one or more method(s) to evaluate anomalous network activity detected in Part 1.2 to determine further actions. (R1.3)
- Protect: Protect internal network security monitoring data collected in support of Requirement R1 and data retained in support of Requirement R3 to mitigate the risks of unauthorized deletion or modification. (R2)
- Retain: Retain internal network security monitoring data associated with network activity determined to be anomalous by the Responsible Entity at a minimum until the action is complete in support of Requirement 1, Part 1.3. (R3)
How Dragos Supports INSM Implementation for Electric Utilities
Dragos offers comprehensive solutions to help bulk electric system asset owners plan and deploy effective INSM strategies:
- Dragos Platform: Purpose-built for industrial environments, the Dragos Platform delivers 24/7 monitoring of internal networks with advanced threat detection, asset visibility, and vulnerability management. It collects the necessary data to detect events in real time and provides the context needed to evaluate whether those events are malicious—supporting rapid response to potential security incidents and aligning with INSM requirements.
- Threat Intelligence: Dragos’s OT-focused threat intelligence enhances INSM effectiveness by providing context-rich insights into potential threats and attack patterns.
- Professional Services: Dragos offers expert guidance on INSM implementation, helping utilities navigate complex regulatory requirements and technical challenges.

Related Resources
Buyer’s Guide: NERC CIP-015: Monitoring Deep Inside Critical Networks to Keep Adversaries Outside
Blog: Prepare to Implement NERC CIP-015 Internal Network Security Monitoring (INSM) Requirements.
Blog: Key Insights for NERC CIP-015 Compliance: Anomaly Detection vs. Detecting Anomalous Activity
Webinar: Understanding NERC CIP-015 and Why You Should Start Now
Webinar: Navigating NERC CIP-015-1: Strategies for Internal Network Security Monitoring at Scale
Press Release: Dragos Helps Electric Utilities Meet Expected NERC CIP Standard for Internal Network Security Monitoring (INSM)
Ready to enhance your utility’s internal network security?
Book a session with one of our INSM experts today.