NERC and the six Regional Entities (collectively the ERO Enterprise) have identified four risk themes that have made it difficult for some entities to mitigate risks associated with the NERC Critical Infrastructure Protection (CIP) Reliability Standards. They published these themes in their 2024 Critical Infrastructure Protection Themes and Lessons Learned report.
The Four Themes Identified:
Latent Vulnerabilities:
The report recognizes a maturing approach to cyber and CIP compliance for medium and high-impact BES Cyber systems. While there are fewer widespread programmatic issues, long-standing higher-risk issues persist undetected within entities’ environments. These are referred to as “latent vulnerabilities.”
The report pointed to the following example issues in managing electronic access:
Insufficient Commitment to Low-Impact Programs
In their section on Insufficient Commitment to Low-Impact Programs, the report highlights the insufficient understanding of the cyber environment and struggles to manage electronic access. This is core to what Industrial Defender partners with utilities on – OT asset management: enabling total visibility of the cyber assets in their OT environment and enhancing situational awareness of related cyber and operational risks.
Customers who have used Industrial Defender for their NERC CIP environments have found significant value in understanding and comprehensively monitoring their OT assets. Many have successfully expanded these practices to their low-impact environments, resulting in enhanced security and operational efficiency.
Industrial Defender’s OT asset management platform improves situational awareness of cyber systems within operational environments. It provides deeper-level asset data and vital endpoint information, along with historical context and change detection. This not only offers visibility of the OT environment but also enables the management of OT assets and associated risks.
Industrial Defender’s granular OT data monitoring enables alerting to unwanted changes in OT environments. This includes suspicious activity such as new or unusual credential use, restricted IP activity, opening of ports and services, and changes to firewall rules. The data collected includes device type, make, model, firmware, software versions, configurations, vulnerabilities, patches, ports and services, user accounts, firewall rules, and PLC key switch positions. This approach maintains a full, comprehensive, and up-to-date view of vulnerabilities without disruptive vulnerability scans.
With this detailed and ongoing monitoring, organizations maintain continuous awareness of whether their systems remain in trusted, secure states.
Shortages of Labor and Skillsets
Quickly touching on this trend, the report notes the skills gap and the increasing strain and complexity on cybersecurity workers across the industry, along with the growing complexity of the cyber landscape. Industrial Defender is a solution to eliminating the manual work in managing OT assets and the daily assessment and compliance tasks. The platform automates these tasks, ensuring current information on your cyber systems and eliminating human error.
Performance Drift
The last trend focuses on physical aspects, which is not something we cover, but we recommend reading the full report if you’re interested in the insights there.
Strategically Addressing OT Cybersecurity Gaps
OT asset management is fundamental to addressing the cybersecurity issues raised in this report. Continuous and detailed monitoring of OT systems is key to understanding what issues you have in your OT environment at any given time, enabling you to take timely and meaningful action to address them. While this helps with compliance audits, it also strengthens your security posture against threats that can occur at any time. The advantage of using Industrial Defender is that we make it easy to obtain deeper, always up-to-date, trustworthy OT asset data to support security and compliance. To learn more, see this case study below.