2025 Updates to NERC CIP Standards: CIP-015-1, CIP-003-12, and CIP-005

Cybersecurity for the Bulk Electric System (BES) continues to evolve as new technologies, threats, and operational challenges emerge. In 2025, several key updates to NERC’s Critical Infrastructure Protection (CIP) standards are reshaping how utilities approach internal network monitoring, security management controls, and remote access. These updates, including the approval of CIP-015-1, ongoing revisions to CIP-003-12, and refinements to CIP-005, reflect a growing emphasis on network visibility, accountability, and proactive cyber defense. All these updates are vital to ensure compliance and enhance the reliability of the bulk electric system.

1. CIP-015-1: Internal Network Security Monitoring (INSM)

CIP-015-1, approved by FERC on June 26, 2025, mandates Internal Network Security Monitoring (INSM) to detect malicious activity via risk-justified data feeds or sensors placed within the Electronic Security Perimeter (ESP). It expands the traditional perimeter-only view to include ‘east-west’ traffic inside trust zones.

Applicable entities are now required to:

  • Implement monitoring capabilities for internal (“east-west”) network traffic between BES Cyber Systems.
  • Document use cases, thresholds, and alerting procedures for identifying abnormal behavior.
  • Ensure evidence of monitoring and incident response activities is retained for audit verification.


CIP-015-1 became effective on September 2, 2025. However, FERC has directed NERC to broaden the scope of CIP-015-2 to include Electronic Access Control and Monitoring Systems (EACMS) and Physical Access Control Systems (PACS) associated with the Electronic Security Perimeter (ESP). Therefore, entities should proactively evaluate their network visibility and logging architectures to prepare for compliance.

2. CIP-003-12: Updates to Security Management Controls

NERC has drafted CIP-003-12, which proposes updates to security management controls to align with new detection and incident reporting expectations. The proposed revisions highlight the importance of monitoring inbound and outbound network traffic for malicious communications. The revisions also reinforce baseline security practices for low-impact BES Cyber Systems.

Key enhancements include:

  • Integration of detection requirements into existing documented policies.
  • Alignment with revised incident reporting thresholds.
  • Entities are expected to provide clearer evidence demonstrating continuous monitoring and response activities.


Entities should review current documentation under CIP-003-11 and update procedures, detection mechanisms, and recordkeeping to meet these expanded expectations.

3. CIP-005: Strengthening Remote Access Security

CIP-005 (Electronic Security Perimeter) continues to evolve with a stronger emphasis on managing remote and vendor access. In draft discussions and industry proposals, enhancements such as strengthening controls for multi-factor authentication, session brokering, and the termination of inactive sessions are expected. These enhancements aim to mitigate risks associated with third-party connections and maintenance activities within operational environments.

To stay compliant, entities should:

  • Verify that all remote access paths are logged, monitored, and brokered through secure gateways.
  • Review and enforce vendor access procedures and session timeouts.
  • Conduct regular tests to validate the effectiveness of remote access protections.

4. Preparing for Compliance and Implementation

The 2025 CIP revisions reflect a broader regulatory shift from static documentation to active monitoring and demonstrable situational awareness. Entities should begin implementing structured readiness plans that include:

  • Network Mapping: Identify where BES Cyber Systems communicate internally and externally.
  • Gap Assessments: Assess monitoring devices and sensor coverage of the ESP.
  • Evidence Management: Ensure all detections, alerts, and responses are properly documented and stored within compliance systems.
  • Training and Awareness: Prepare staff with the new information on INSM, remote access, and detection techniques.
  • Future Planning: Design flexible architectures to incorporate the expected CIP-015-2 expansion to EACMS and PACS.

Conclusion

The 2025 CIP updates mark a new phase of cybersecurity regulation, emphasizing network visibility, continuous security control, and accountability for both internal and third-party systems. Active planning, documenting, and testing of their controls will help organizations have a better chance of succeeding with auditing and operational resilience. By proactively adapting to these evolving standards, utilities can strengthen both compliance and system reliability.

For expert assistance with implementing 2025 CIP updates—including INSM readiness, security management controls, and remote access compliance—contact us at NERCExperts@certrec.com or visit www.certrec.com.

Share

Services

Preparing for Your NERC Audit Checklist

Respond to NRC requests and share information securely.

NERC Audit Checklist

Streamline Your NERC Audit Preparation Process

As a trusted resource in regulatory compliance, Certrec simplifies your journey through complex regulatory requirements, enabling a smooth audit experience. Our comprehensive NERC Audit Checklist offers a structured approach to preparing, ensuring you’re ready for every phase of the audit process. This checklist covers crucial steps, from identifying standards to preparing evidence, guiding you through the preparation, and reducing audit stress.

NERC Audit Checklist

Designed for Compliance Success

Certrec’s NERC Audit Checklist is crafted by compliance experts to help you avoid common pitfalls and ensure effective audit preparation. With this checklist, you can:

  • Identify applicable standards and audit requirements.
  • Gather and organize necessary audit evidence.
  • Develop robust RSAW narratives and evidence packages.
  • Strategize to handle any potential noncompliance findings.
  • Conduct thorough mock audits to prepare your team.
NERC Audit Checklist

Avoid the Challenges of Manual Compliance Preparation

Traditional methods can be overwhelming, requiring multiple tools and extensive manual effort. Certrec’s NERC Audit Checklist organizes your compliance needs into a comprehensive resource, allowing for more effective and streamlined preparation.

Need Help?

Speak with Our Experts

NERC Audit Checklist

Key Features of the NERC Audit Checklist

  1. Understand Audit Evidence Requirements
    Collect all essential documentation, including policies, procedures, and records that prove your compliance. Ensure you have supporting materials such as screenshots, reports, training records, and other documentation.
  2. Develop RSAW Narratives and Evidence Packages
    Create clear narratives in your RSAW to guide auditors through your compliance evidence. Explain how your processes meet compliance standards and outline any internal controls used to maintain compliance.
  3. Prepare for Potential Noncompliance
    Use the self-report process for any potential noncompliance findings before the audit. This proactive step helps mitigate findings during the audit.
  4. Conduct a Realistic Mock Audit
    Engage in a mock audit to simulate the official process, including interviews, question-and-answer sessions, and evidence requests. Familiarize your staff with the audit process, ensuring they can confidently present your compliance evidence.

Automate your NERC audit preparation, evidence management, compliance tracking, and follow-up actions.

Certrec offers tailored audit preparation services to assist you with every aspect of your NERC audit journey. Our team can conduct mock audits, provide witness coaching, and support you with RSAW development.

Community Insights

Research questions from individual NRC inspectors and see responses across participating sites.

Save Time and Resources

Based on the experience of our clients, we have concluded IMS provides a realistic savings of $70,000 per site per year.

Controlled NRC Access

Manage NRC access to responses and remove access once an inspection ends.

Secure

We are ISO/IEC 27001:2022 certified, completing yearly audits and SOC 2 Type 2 examinations.

Vendor-Hosted Solution

Free up your IT resources. IMS is cloud-based with all data FedRamp secure and stored in the U.S. For the past 7 years our availability has been greater than 99.9%.

Mobile Friendly

IMS is accessible through a web browser and is mobile and tablet friendly for use while in the field.