Streamline Your INSM Compliance Efforts With SEL Expertise
Reduce the Stress of Compliance
Get the Most Value From Your Existing Hardware
Make SEL Cybersecurity Expertise Your Own
SEL INSM Services
System Assessment
SEL will analyze your systems to learn how they work under normal circumstances, creating a baseline. As part of this service, we identify and document all external and internal access points and communication paths to assets. With our help, your team will better understand how to best protect your system and whether you already have compatible equipment to leverage in your INSM system.
INSM Solution Design
Once we establish a system baseline, SEL will custom-engineer an INSM solution. This solution consists of sensors, switches, and data feeds. When designing your INSM solution, SEL engineers can incorporate any compatible equipment you already have or leverage SEL devices featuring the industry’s best warranty and support.
System Deployment
Your organization doesn’t have to carry the burden of INSM system deployment alone. SEL will install and commission all the INSM equipment you need and deploy your system updates, reducing the load on your operations control team.
IDS Procurement
SEL will work with leading IDS vendors and select the best system to meet your needs. Your IDS system will monitor the traffic on your network and alert you in the event of suspicious activity, acting like a surveillance camera inside your security perimeter. With an IDS sensor in a central location and paired with operational technology (OT) software-defined networking (SDN), you can tap traffic across your network and deliver it to the sensor without the complexity and overhead of other tunneling solutions.
Policy and Process Creation
SEL will help you create and document the INSM policies and processes required for compliance. This ensures you have everything you need to pass an audit with confidence.
Cyber Lifecycle Services
Readiness and Response
We will proactively assess and strengthen your cybersecurity posture with a wide variety of preventive measures, minimizing the impact of security threats. And if a cybersecurity incident does occur, SEL will help resecure your OT system.
Monitoring
With our cyber-monitoring services, we will improve asset visibility and threat detection by monitoring for suspicious activity in your network and alerting your team if such activity is detected—fulfilling the role of a full-time security analyst.
What Does NERC CIP-015 Require?
SEL helps electric utilities and other entities serving the bulk electric system (BES) implement INSM to support compliance with NERC CIP-015. An INSM system must continuously monitor networks for suspicious activity inside organization security perimeters.
This standard requires BES industries to establish INSM, complete with documented policies to manage and protect the collected data. To comply with the standard, utilities must:
Implement INSM
SEL will install tools to monitor network connections, installed devices, and communications. Once the tools are in place to learn how the system works under normal circumstances, we’ll implement a method to detect suspicious activity and create a process to evaluate those suspicious events.
Document a Record-Retention Policy
SEL will help you implement a documented process to retain INSM data associated with anomalous network activity. INSM systems collect vast amounts of data, which companies must keep available for analysis and action when needed.
Protect the Data You Retain
Having applied the tools and processes to collect INSM data, SEL will help you create a process to ensure INSM data can't be compromised, modified, or deleted by threat actors.
Related Products
Many SEL products and solutions already support compliance with regulatory requirements like NERC CIP-015. We’ll help you leverage existing hardware to tailor an INSM solution.