Best practices
Our best practice documents contain security recommendations for ENCS members’ security specialists. These best practices for cyber security are developed in the security programs, based on the experience of other members. They cover a wide variety of topics, such as setting up an information security management system, defining use cases for security operations, and selecting sensors to monitor operational technology systems.
WP-063-2024: Tabletop exercises: Physical break-in scenario
This document outlines the scenario of a physical break-in in a high-voltage substation in which the intruders have tampered with digital equipment. Member organizations can use this scenario as a baseline and use their incident response processes to guide the expected answers during the exercise.
WP-062-2023: Initial analysis of the RED harmonized standard
On 22 August 2023, CEN/CENELEC published an updated draft of the harmonized standard for the RED cybersecurity requirement. The harmonized standard specifies how manufacturers should
WP-061-2022: Update on EU regulations
The European Union has been very active in developing new regulations to manage cybersecurity risks. In 2022, we expect that three different regulations will be
WP-060-2022: Analysis of the Industroyer 2 malware
On April 12, ESET announced that it found new OT-targeted malware at a Ukrainian Energy company. Like the Industroyer malware used in the attacks on
WP-059-2022: Changes in the ACER revision of the NCCS
On 14 April 2022, ACER published a first draft of their revision of the draft network code on cybersecurity. This document gives an overview of
WP-057-2022: Update on the Network Code on Cybersecurity
On 14 January 2022, ENTSO-E and the EU DSO submitted the draft network code for cybersecurity to ACER. ACER will review the draft in the
WP-056-2022: Review of DLMS security features for smart meters
In this document we describe what DLMS security features a DSO should select when procuring new meters, and how they should check if these are implemented well.
WP-053-2021: Updated test results for OT security sensors inside substations
Many grid operators are using specialized security sensors to monitor their central OT networks. The sensors can automatically learn what normal network communication looks like,
WP-052-2021: Deployment options for substation security monitoring
An increasing number of grid operators search for solutions to monitor the security of their substations from inside the internal LANs. They see passive monitoring
WP-051-2021: Requirements for security monitoring solutions
This document presents security requirements that grid operators can use in their procurement documents for new security monitoring solutions either for their SCADA systems or
WP-049-2021: Rhebo Industrial Protector
This report presents the test results for the Rhebo Industiral Protector security sensors for a laboratory tests on substations traffic. Our members have shown an
WP-048-2021: Omicron StationGuard test results
This report presents the test results for the Omicron StationGuard security sensors for a laboratory tests on substations traffic. Our members have shown an increasing
WP-047-2021: Nozomi Guardian test results
This report presents the test results for the Nozomi Guardian security sensors for a laboratory tests on substations traffic. Our members have shown an increasing
WP-046-2021: Forescout SilentDefense test results
This report presents the test results for the Forescout SilentDefense security sensors for a laboratory tests on substations traffic and two tests in members’ substations.
WP-045-2021: Cisco Cyber Vision test results
This report presents the test results for the Cisco Cyber Vision security sensors for a laboratory tests on substations traffic. Our members have shown an
WP-044-2021 Requirements Catalogue [DRAFT]
This whitepaper provides a catalog of security requirements for procuring smart grid devices. Since 2015, ENCS has published a series of security requirements sets for
WP-043-2019: ISMS Best Practice Guide
The objective of the member project for Information Security Management was to gather and share best practices for implementing and running an Information Security Management
WP-041-2018: Risk-based use cases for OT monitoring
A catalogue of monitoring detection activities for OT systems linked to threats. This document proposes a risk-based approach to OT security monitoring. Detection activities are
WP-039-2021: Towards an evaluation method for IEC 62443
The IEC 62443 standard is used by many grid operators for the security of their operational technology (OT) systems. Usually, they use the parts on
WP-035-2020: Proposed strategy for OT component certification
The European Commission has made certification of products, services and processes one of the pillars of their cybersecurity strategy.In the 2019 Cybersecurity Act, ENISA was
WP-034-2020: Update on the revised NIS directive
This whitepaper gives an update to ENCS members on the revised NIS directive. On 16 December 2020, the European Commission adopted a proposal for a
WP-033-2020: Test results for OT security sensors monitoring inside substations
Many grid operators are using specialized security sensors to monitor their central OT networks. The sensors can automatically learn what normal network communication looks like,
WP-032-2020: Centralized access control for field devices
This whitepaper recommends methods to implement centralized access control for field devices. Centralized access control would allow grid operators to greatly improve the security of
WP-030-2020: Hardware security test report for DA RTU
This test report gives the results of testing a distribution automation remote terminal unit (RTU) against the hardware security requirements that ENCS has developed in
WP-028-2020: Market survey of OT security sensors for substations
This report contains the results of a market survey on OT security sensors for substations. In 2017, the ENCS ran a project on security monitoring
WP-027-2020: Security measures for grid operators connecting to DER
This reports recommends security measuers for grid operators connecting to distributed energy resources (DER). As alternative energy sources, such have wind, solar or heat, have
WP-026-2020: Zero-trust SCADA systems
This whitepaper analyzes what would be needed to implement zero trust for SCADA system. SCADA systems are probably the most critical systems for most grid
WP-024-2020: The risk of using web interfaces remotely
ENCS recommends to avoid remotely managing field devices, such as RTUs, gateways, and data concentrators, through a web interface. Engineers commonly use a web interface
WP-023-2020: Protecting distribution automation systems against physical attacks
This document provides a strategy for grid operators to protect distribution automation systems against physical attacks on field locations. Grid operators rely on distribution automation
WP-022-2020: Risk assessment of physical attacks against field devices
This report assesses the risk of physical attacks against field devices to be able to select the right hardware security measures. Increasingly vendors are including
WP-021-2020: Security requirements for hardware security measures
This document gives requirements that grid operators can use to specify hardware security measures. More vendors are including hardware security measures in smart grid field
WP-018-2020: BowTies for security risk assessment
This guide describes how to analyze risk by constructing a BowTie diagram. How the analysis can be used in a risk management process compatible with
WP-017-2019: ISMS MP Key Findings
The objective of the member project for Information Security Management was to gather and share best practices for implementing and running an Information Security Management
WP-016-2019: Options for product certification
Whitepaper comparing different options for security certifications for products.
WP-015-2019: Security roadmap for substation automation
Many grid operators are considering new use cases for substation automation, such as direct IEC 61850 communication between the control center and IEDs, remote configuration
WP-014-2019: Security monitoring for substation automation
This document present a strategy to monitor the security of substation. The strategy makes it difficult for advanced threats to execute controlled attacks. Advanced threats
WP-013-2019: Improving the security of legacy substations
This document describes a strategy to improve the cyber security of legacy substations.Substation automation equipment is not frequently replaced because of the high cost of
WP-012-2018: New sensors for monitoring OT security
There are many sensors to monitor the security of IT systems. Vulnerability scanners can findand track vulnerabilities. Anti-virus can detect malware on laptops or servers.
WP-011-2018: Organizing security operations for OT
Grid operators need to react to security developments quickly .When new vulnerabilities arefound, they need to quickly patch, or take other measures. When they suspect
WP-010-2018: Security policy for substation automation
This document describes the recommended security policies for each of these roles. The policies cover:• Substation engineers configuring the equipment in the substation, including setting
WP-009-2018: Darktrace: First Impressions
In this article, we share the first impressions from the network-based monitoring sensor, Darktrace.
WP-008-2018: Five use cases to get started with OT security monitoring
Setting up security monitoring for Operational Technology (OT) systems can be a daunting task. Sensors need to be placed in the OT systems to detect
ENCS informs its members about this attack and provide an interpretation. It is a new entry in the short list of publicly disclosed malwares that
WP-006-2018: OT Security Sensors – Market Survey
In recent years, sensors have come on the market to monitor the security of Operational Technology (OT) systems. A previous market survey, identified a new
WP-005-2018: Organizing OT security operations – Best practices
Trying to organize a security operations team raises many questions. What should the mission of the team be? What capabilities should the team have? Where
WP-004-2017: Crashoverride Industroyer
Report on CrashOverride/Industroyer threat
WP-003-2016: OT Security Monitoring Architecture
This document describes an architecture for monitoring process IT (PIT) environments. It was developed as part of a project started by E.ON Group to support
WP-002-2016 OT security monitoring market survey
This document provides an overview of the software products available for monitoring process IT (PIT) systems. The market overview is meant to give DSOs insight
WP-001-2016: Preliminary report Ukraine incident
On December 23, 2015 a power-outage occurred in the Ukraine, which affected around half of the homes in the Ivano-Frankivsk region. After the outage, malware