Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
NERC CIP-014 Standard Explained
Published:
October 7, 2024

NERC CIP-014 Standard Explained

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect
__wf_reserved_inherit

We sat down with Brian Harrell, VP of Security at AlertEnterprise, and talked about the NERC CIP-014 Standard. If you aren’t familiar with CIP-014 or just want to learn more, Brian gives some great advice on the standard and its purpose to increase physical security protections of utilities across North America. As a physical security expert, Brian was on the CIP-014 drafting team and gives some valuable insight behind the creation of the standard. Brian also discusses some options to consider even if CIP-014 doesn’t apply to your entity and some best practices to protect your facilities.

What is the purpose of CIP-014 standard and why is it important?

The NERC CIP-014 standard is the regulatory result of a significant physical security attack that happened a few years ago. A major transmission substation in Central California was attacked on April 16, 2013. Shooting for over 19 minutes, the attacker(s) destroyed, damaged, or degraded 17 electrical transformers that funnel power to Silicon Valley, resulting in over $15 million worth of damages. Prior to shots being fired, the attacker(s) first entered six AT&T fiber-optic telecommunications vaults, severing 911 and communication lines. The criminal(s) then proceeded to shoot over 100 7.62 mm rounds into transformers and other grid components. If the gunfire wasn’t already enough to destroy the transformers, they subsequently began to leak tens of thousands of gallons of transformer oil, causing them to overheat and shut down. In my opinion, there is no doubt that this was a sophisticated yet low-tech attack by attacker(s) with industry knowledge. Unfortunately, the attacker(s) have not been brought to justice and nobody to-date is sitting behind bars.

__wf_reserved_inherit

As a result of the Metcalf attack I just spoke of, the Federal Energy Regulatory Commission (FERC) ordered NERC, within 90 days, to develop a physical security standard designed to enhance physical security measures for the most critical Bulk-Power System (BPS) facilities, thereby lessening the vulnerability to physical attacks. As you can imagine, creating a standard and having industry, the NERC Board of Trustees, and FERC quickly approve it was a tall task.

Can you break down what is required under CIP-014?

Having been on the NERC CIP-014 Standard Drafting Team (SDT), we wanted to create a standard that targeted the most critical substations and control centers in North America – not the entire list of 55,000 transmission substations (> 100 kV) currently on the map. The goal was to harden infrastructure, manage risk, and be mindful of the time in which it would take to add improvements along with the cost. The conversations centered on particular substations that if rendered inoperable or damaged as a result of a physical attack could result in instability, uncontrolled separation, or cascading within an Interconnection.

There are six requirements within CIP-014 that Registered Entities must comply with, if you meet the inclusion criteria. The inclusion criteria can be a bit complicated, but at a high level, if you have a 500 kV substation, or a 200-499 kV substation that is connected to three or more other substations (200 kV or higher), you are likely subject to the standard. Additional criteria are listed, so take a look.

Here is the requirement breakdown:

R1. Perform an initial transmission risk assessment. This analysis is designed to identify substation(s) that if rendered inoperable or damaged could result in instability, uncontrolled separation, or cascading within an Interconnection. This needs to happen once every 30 calendar months.

R2. The Transmission Owner needs to have an unaffiliated third-party verify the initial risk assessment to determine if the substation is critical.

R3. If an entity (Transmission Owner) has a primary control center that can operationally control the substation, they would need to notify the Transmission Operator (TOP).

R4. If you identified a substation, or a primary control center in R1, verified according to R2, and made notifications according to R3, you will need to conduct a security threat and vulnerability assessment (TVA) against those substations(s) and primary control center(s). This assessment should consider prior security events such as vandalism and sabotage, as well as threat warnings from law enforcement, the Electricity Information Sharing and Analysis Center (E-ISAC), and other U.S. or Canadian governmental agencies.

R5. Based off the threats and vulnerabilities discovered in R4, the Entity would now need to develop a physical security plan designed to deter, detect, delay, assess, communicate, and respond to these potential physical threats and vulnerabilities.

R6. Once the TVA has been conducted, and a physical security plan has been put in place, the Entity must have an unaffiliated third-party review R4 and R5. The reason we added this requirement is that we felt it was important to inject qualified experts into the compliance process as it adds a deeper understanding of physical security and a fresh set of eyes.

How many utilities does CIP-014 affect in North America and should they be worried?

I can recall sitting around the table, early on during SDT meetings, where numbers were discussed and we always prefaced the “numbers” conversation in the context of reducing risk to the most critical substations. That was the ultimate goal, and I think we succeeded. That said, the early projections were that the standard was likely to capture approximately 500 substations and primary control centers. Now that the compliance process has played out, my estimation is that this number is closer to about 1,500 CIP-014 sites. NERC and the Regions have done a very good job with outreach and communicating compliance guidelines. I don’t think utilities should be worried, but if they have concerns, they should contact their regulator or a trusted consultant for guidance.

"Now that the compliance process has played out, my estimation is that this number is closer to about 1,500 CIP-014 sites."

What are some of the typical challenges implementing a CIP-014 program?

A few challenges exist. First, many utilities feel that in order to come into compliance they must spend millions of dollars overnight. As a matter of fact, NERC and the Regions have been very flexible with the implementation of additional security measures. The regulator fully understands that it takes time to plan and allocate the capital funding, and then hire contractors and consultants to install fencing, cameras, access control, etc. So, when building your physical security plan (R5), use what I call “future state” language. Meaning, you can articulate that you are going to update, install, and add security protective measures in the future, but be clear on completion dates. You must also be reasonable in your timing – not more than 2 ½ years from the time in which you write the security plan (R5).

"Use what I call “future state” language. Meaning, you can articulate that you are going to update, install, and add security protective measures in the future, but be clear on completion dates."

Next, CIP-014 was never meant to be a “check the box” compliance standard with a cookie cutter approach. Every TVA (R4) and physical security plan (R5) is unique to that substation or primary control center. It’s imperative that for every plan that is written, it is specific to that site. This requires engaging local law enforcement and truly understanding the threats placed on that facility. What are the geographical threats, line-of-site issues, and frequency of vandalism and/or sabotage? Additionally, how are you detecting threats and maintaining situational awareness on what is considered a critical substation to the power grid? The days are gone where industry has a high-voltage substation out in the middle of nowhere, unmanned, and not monitored.

Even if CIP-014 doesn’t apply to my entity, what could I be doing to protect my assets?

__wf_reserved_inherit

Great question! Most substations will not fall under CIP-014, but that doesn’t mean they aren’t critical to a utilities’ business or reputation. Every utility should consider the following items when thinking about securing a “critical” site or creating a security plan.

  1. Perimeter Security
  2. Access Control
  3. Lighting
  4. CCTV/Cameras and Remote Monitoring
  5. Intrusion Detection
  6. Entry/Exit hardening
  7. Line-of-sight Gunfire Mitigation
  8. Standoff Distances to Critical Assets
  9. Key and Lock Program
  10. Visitor Access
  11. Security Signage
  12. Personnel Screening and Background Checks
  13. Insider Threat
  14. Drones and the Overhead Threat
  15. Use of Security Patrols

Any other advice or resources when it comes to learning more about implementing a CIP-014 program?

A great resource for utility security is the American Public Power Association (APPA) Physical Security Essentials Primer that came out last year. If you are looking for guidance, checklists, and industry best practices, you will certainly find this useful.

It can be assumed that at some point, a North American utility will again suffer from a planned and coordinated attack against its electric infrastructure. Have these utilities examined credible threats closely enough? Did they prepare to respond, recover, and communicate? As an industry, many will be judged and hard questions will be asked about how seriously threats were considered and what was done to mitigate future attacks. Success will be determined by how quickly the industry responds and the swiftness of system recovery.

Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy