Industry Guides

Energy Sector Software Security and NERC CIP Compliance

Power utilities and energy companies must secure software supply chains while meeting NERC CIP requirements. Here's a practical approach.

Michael
OT Security Consultant
7 min read

The energy sector has a problem that most industries don't: software vulnerabilities can cause physical consequences. A compromised component in a SCADA system doesn't just leak data -- it can disrupt power generation, damage equipment, or endanger workers. The Colonial Pipeline ransomware attack demonstrated what happens when energy sector cyber defenses fail. Now imagine an attack that enters through a trusted software update.

Energy companies, particularly those operating bulk electric systems, must navigate software supply chain security within the constraints of NERC CIP standards, operational technology (OT) environments, and the reality that some of their most critical systems run software that predates modern security practices.

The Energy Sector Software Environment

Energy companies run two distinct software environments that are increasingly interconnected:

Information Technology (IT). Standard enterprise systems -- ERP, email, web applications, business analytics. These use modern software stacks with extensive open-source dependencies.

Operational Technology (OT). Industrial control systems that manage physical processes -- SCADA, DCS, PLCs, RTUs, HMIs, and Energy Management Systems. OT software has different characteristics: longer lifecycles, less frequent updates, vendor-specific platforms, and real-time requirements.

The convergence of IT and OT -- driven by efficiency and digital transformation -- means that IT software supply chain risks increasingly affect OT environments. A vulnerable library in an IT integration layer can provide a pathway into OT networks.

NERC CIP and Software Supply Chain

NERC CIP (Critical Infrastructure Protection) standards apply to entities responsible for the reliability of the bulk electric system. Several CIP standards directly relate to software supply chain security:

CIP-010: Configuration Change Management and Vulnerability Assessments

CIP-010 requires entities to maintain baseline configurations for BES Cyber Systems and to assess vulnerabilities. Software supply chain visibility is essential for:

  • Knowing what software components are part of your baseline configuration
  • Identifying when a component update changes the configuration baseline
  • Assessing whether newly discovered vulnerabilities affect your BES Cyber Systems

Without SBOMs for the software running on your BES Cyber Systems, your baseline documentation is incomplete and your vulnerability assessments have blind spots.

CIP-013: Supply Chain Risk Management

CIP-013 explicitly requires entities to develop and implement supply chain risk management plans for industrial control system hardware, software, and services. This includes:

  • Processes for vendor risk assessment
  • Notification requirements for security events affecting vendor products
  • Verification of software integrity before installation
  • Coordination of vendor-managed remote access

CIP-013 is the most directly relevant standard for software supply chain security. Your supply chain risk management plan should include SBOM requirements for critical vendors and continuous monitoring of software components.

CIP-007: System Security Management

CIP-007 requires security patch management for BES Cyber Systems. When a software supply chain vulnerability is disclosed, you need to:

  • Determine if you are affected (requires component-level visibility)
  • Assess the risk to BES Cyber Systems
  • Apply patches within required timeframes or document compensating measures

The patch management requirements in CIP-007 are only achievable if you know what software components are running on your systems.

The OT Software Supply Chain Challenge

OT environments present unique software supply chain challenges that don't exist in IT:

Vendor lock-in. Many OT systems use proprietary software from a single vendor. You may have limited visibility into what components that vendor uses and limited ability to apply patches independently.

Validation requirements. Patches to OT systems often require extensive testing and validation. You can't deploy a patch to a turbine control system the same way you update a web server. This means longer exposure windows for known vulnerabilities.

Availability requirements. OT systems often cannot be taken offline for updates. Power plants, substations, and grid management systems need to operate continuously. Patching may only be possible during scheduled maintenance windows.

Legacy systems. Some OT systems in the energy sector are 15-20 years old, running operating systems and software that are well past end of life. These systems may contain hundreds of known vulnerabilities in components that will never be updated.

Air-gapped environments. Critical OT networks are often air-gapped, which complicates both vulnerability monitoring (no real-time feeds) and patch delivery.

Building an Energy Sector SBOM Program

Prioritize by CIP Classification

Start with your highest-impact BES Cyber Systems. CIP classifies systems by their impact to the bulk electric system:

  • High impact: Control centers, backup control centers
  • Medium impact: Generating facilities >1500 MW, transmission stations >500 kV
  • Low impact: Other BES Cyber Systems

Focus your initial SBOM efforts on high and medium impact systems. These are where supply chain vulnerabilities pose the greatest risk to grid reliability.

Work With OT Vendors

For proprietary OT software, you depend on vendors for supply chain transparency. Your approach should include:

  • Contractual SBOM requirements. Include SBOM delivery in new procurement contracts. Specify format (CycloneDX or SPDX) and update frequency.
  • Vulnerability notification agreements. Require vendors to notify you when vulnerabilities are discovered in components used in their products.
  • Patch availability SLAs. Define expectations for how quickly vendors will provide patches after a vulnerability is disclosed.
  • CIP-013 assessments. Include software supply chain questions in your CIP-013 vendor assessments.

Secure IT-OT Integration Points

The integration layer between IT and OT is often where modern, component-rich software meets legacy OT systems. Pay special attention to:

  • Historian servers and data collection platforms
  • Web-based HMI interfaces
  • Integration middleware and API gateways
  • Remote access solutions

These systems often use modern web frameworks and open-source components, making them susceptible to the same supply chain vulnerabilities as IT systems.

Implement Offline Vulnerability Monitoring

For air-gapped OT environments, you need a vulnerability monitoring approach that works without internet connectivity:

  • Generate SBOMs from OT systems during maintenance windows
  • Transfer SBOMs to connected environments for analysis
  • Match components against offline copies of vulnerability databases
  • Feed results back into your CIP-010 vulnerability assessment process

This is operationally more complex than continuous online monitoring, but it's achievable and provides the visibility that CIP compliance requires.

Document for Compliance

NERC CIP compliance requires extensive documentation. Your SBOM program documentation should include:

  • SBOM generation and management procedures
  • Vendor SBOM requirements and tracking
  • Vulnerability monitoring and response processes
  • Integration with CIP-010 baseline management
  • Integration with CIP-013 supply chain risk management plan
  • Evidence of implementation (SBOM artifacts, monitoring logs, response records)

The Renewable Energy Angle

As the energy sector adds renewable generation, new software supply chains enter the environment. Wind farm management systems, solar inverter controllers, battery management systems, and grid-scale storage controllers all run software with supply chain dependencies.

These newer systems often use more modern software stacks -- cloud-connected platforms, containerized applications, and extensive open-source usage. They bring modern supply chain risks into the energy sector, but they're also more amenable to modern SBOM tooling.

How Safeguard.sh Helps

Safeguard.sh provides energy companies with the SBOM management and vulnerability monitoring capabilities needed for NERC CIP compliance. The platform generates SBOMs for IT applications and integration layers, ingests vendor-provided SBOMs for OT systems, and provides continuous vulnerability monitoring that maps directly to CIP-007 patch management and CIP-010 vulnerability assessment requirements.

For CIP-013 compliance, Safeguard.sh helps track vendor SBOM delivery and provides a centralized view of software supply chain risk across BES Cyber Systems. The platform supports the documentation and evidence generation that NERC auditors expect, including component inventories, vulnerability assessment records, and patch management timelines.

Energy companies using Safeguard.sh can demonstrate to NERC auditors that they have systematic visibility into the software running on their critical systems -- not just the application names, but the actual components and their vulnerability status.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.