INSIGHTS

Internal Network Security Monitoring for Utilities

Internal Network Security Monitoring (INSM) is transforming how electric utilities protect critical infrastructure. With NERC CIP-015 requirements and evolving cyber threats, INSM provides essential visibility into trusted network zones while supporting regulatory compliance and operational resilience.

INSM Fundamentals
Internal network security monitoring (INSM) provides continuous visibility into trusted network zones, enabling utilities to detect threats that bypass perimeter defenses.
INSM Requirements
NERC CIP-015 mandates comprehensive internal network security monitoring capabilities for High and Medium Impact BES Cyber Systems. Requirements include monitoring network data feeds, detecting anomalous activity, analyzing threats, protecting monitoring data, and retaining investigation records.
CIP-015 Compliance Deadline: October 1, 2028
Asset owners have just over 3 years to implement internal network security monitoring for High and Medium Impact BES Cyber Systems. Start planning now.
Case study
This case study examines how Dominion Energy transformed their security posture through a comprehensive implementation of the Dragos Platform for internal network security monitoring. What distinguishes Dominion’s approach is their fundamental recognition that “being compliant doesn’t equal being cyber secure.”
Related Resources
Webinar
Tim Conway (SANS) & Robert M. Lee (Dragos) share how to approach INSM for CIP-015—covering planning, implementation, compliance prep, and what effective INSM looks like in practice
FAQ

Internal Network Security Monitoring involves continuous observation and analysis of network traffic within an organization’s internal infrastructure. For electric utilities, INSM focuses on detecting anomalous activities that may indicate potential threats or vulnerabilities within trusted network zones.

INSM requirements for utilities include network data collection from trusted zones, anomaly detection capabilities, threat analysis and evaluation processes, data protection mechanisms, retention procedures for investigative purposes, and integration with broader cybersecurity operations aligned with NERC CIP-015 standards.

Internal network security monitoring provides enhanced threat detection within trusted zones, improved incident response capabilities, regulatory compliance support, better asset protection from lateral movement attacks, operational visibility into network behavior, and qualification for FERC Order 893 cost recovery incentives.

INSM implementation involves conducting network architecture assessments, identifying monitoring points within BES Cyber Systems, evaluating current detection capabilities, developing data management procedures, training personnel on CIP-015 requirements, and partnering with experienced INSM solution providers.

Utilities should seek INSM solutions with OT-native capabilities, passive monitoring techniques, industrial protocol understanding, scalable data management, NERC CIP compliance reporting features, threat intelligence integration, expert implementation support, and proven electric utility sector experience.

Take the next step to protect your ICS environment now with a free demo.