EVENT:

North America Forum – Join us in Chicago, May 14–15, for top-tier OT security strategies, sessions and workshops.

Skip to main content
INSM

Internal Network Security Monitoring

The North American electric sector has been working towards new regulatory requirements for internal network security monitoring. As cyber threats evolve and regulatory requirements tighten, electric utilities must adopt robust strategies to secure their internal networks.

Request a Strategy Session

What is Internal Network Security Monitoring? 

Internal Network Security Monitoring (INSM) involves the continuous observation and analysis of network traffic within an organization’s internal infrastructure. For electric utilities, INSM is a critical component of cybersecurity strategy, focusing on detecting anomalous activities that may indicate potential threats or vulnerabilities within trusted network zones. 

Why Electric Utilities Should Start INSM Planning Now

As cyber threats become more sophisticated and regulatory requirements more stringent, implementing robust INSM strategies is crucial for protecting critical infrastructure and ensuring the reliability of the bulk electric system.

Early adoption of INSM not only ensures compliance but also provides a competitive advantage in terms of cybersecurity readiness. By partnering with industry leaders like Dragos and taking proactive steps towards INSM implementation, electric utilities can stay ahead of threats, ensure compliance, and safeguard their operations for years to come.

Benefits of INSM 

Implementing INSM offers several advantages for electric utilities: 

    vuln management

    Enhanced Threat Detection

    INSM allows for early identification of potential security breaches, malware infections, or insider threats by monitoring east-west traffic within trusted zones.

    Dragos Webinar: a teal icon of the outline of a person inside of a computer scree with a speech bubble

    Improved Incident Response

    With real-time monitoring, utilities can respond swiftly to security incidents, minimizing potential damage and downtime.

    Dragos Whitepaper

    Regulatory Compliance

    INSM helps utilities meet evolving regulatory requirements, particularly those set by NERC CIP standards.

    Asset Protection

    By monitoring internal network activities, utilities can better protect critical assets and sensitive data from unauthorized access or manipulation.

    Operational Visibility

    INSM provides valuable insights into network behavior, helping utilities optimize their infrastructure and identify potential operational issues.

    Early Adopter Incentives

    FERC Order No. 893 provides deferred cost recovery incentives to help utilities invest in advanced cybersecurity technology, offering quicker financial returns.

    Regulatory Outlook: The Future of the NERC CIP Standards  

    Achieving NERC CIP Compliance requires a comprehensive approach to internal network security. The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards are designed to ensure the reliability and security of the bulk electric system. With the introduction of CIP-015, INSM has become a focal point for compliance efforts.

    NERC CIP-015 specifically addresses Internal Network Security Monitoring requirements for High and Medium Impact Bulk Electric System (BES) Cyber Systems.

    Key aspects of these requirements include: 

    • Monitor: Implement, using a risk-based rationale, network data feed(s) to monitor network activity; including connections, devices, and network communications. (R1.1)
    • Detect: Implement one or more method(s) to detect anomalous network activity using the network data feed(s) from Part 1.1. (R1.2)
    • Analyze: Implement one or more method(s) to evaluate anomalous network activity detected in Part 1.2 to determine further actions. (R1.3)
    • Protect: Protect internal network security monitoring data collected in support of Requirement R1 and data retained in support of Requirement R3 to mitigate the risks of unauthorized deletion or modification. (R2)
    • Retain: Retain internal network security monitoring data associated with network activity determined to be anomalous by the Responsible Entity at a minimum until the action is complete in support of Requirement 1, Part 1.3. (R3)

    How Dragos Supports INSM Implementation for Electric Utilities

    Dragos offers comprehensive solutions to help bulk electric system asset owners plan and deploy effective INSM strategies: 

    • Dragos Platform: Purpose-built for industrial environments, the Dragos Platform delivers 24/7 monitoring of internal networks with advanced threat detection, asset visibility, and vulnerability management. It collects the necessary data to detect events in real time and provides the context needed to evaluate whether those events are malicious—supporting rapid response to potential security incidents and aligning with INSM requirements.
    • Threat Intelligence: Dragos’s OT-focused threat intelligence enhances INSM effectiveness by providing context-rich insights into potential threats and attack patterns. 
    • Professional Services: Dragos offers expert guidance on INSM implementation, helping utilities navigate complex regulatory requirements and technical challenges. 
    Incident Response with the Dragos Platform. dragos cybersecurity platform icon for industrial cybersecurity. Dragos platform, community defense, ot threat intelligence, and ot expert services for industrial cyber security

    Related Resources

    Buyer’s Guide: NERC CIP-015: Monitoring Deep Inside Critical Networks to Keep Adversaries Outside

    Blog: Prepare to Implement NERC CIP-015 Internal Network Security Monitoring (INSM) Requirements.

    Blog: Key Insights for NERC CIP-015 Compliance: Anomaly Detection vs. Detecting Anomalous Activity

    Webinar: Understanding NERC CIP-015 and Why You Should Start Now

    Webinar: Navigating NERC CIP-015-1: Strategies for Internal Network Security Monitoring at Scale 

    Press Release: Dragos Helps Electric Utilities Meet Expected NERC CIP Standard for Internal Network Security Monitoring (INSM) 

    Ready to enhance your utility’s internal network security?

    Book a session with one of our INSM experts today.