Security architecture program 2025

ENCS organises its knowledge development in 3 programs: policy, architecture, and operations. Below, you can explore what we have planned in these areas for 2025.

The architecture program aims to develop and share knowledge with security architects and others responsible for technical security measures. It covers the design of secure systems and setting security requirements for procuring secure components. 

We will work on secure connections from OT systems to the outside, and virtualization and containerization in substations and other field locations. We will also participate in the drafting of harmonized standards for the Cyber Resilience Act (CRA). 

Securing connections from OT to the outside

Protecting the boundary between IT and OT, has always been the key strategy to protecting OT systems.

But the connections from OT to outside systems are increasing. For instance, we see:

  • more connections to IT systems to get configuration data and software.
  • connections to the SOC for collecting logs.
  • connections to cloud systems used for market facilitation or collaboration between grid operators.
  • connections to external DER operators for balancing and congestion management.

The question is how to effectively secure all these connections, without hindering the deployment of new systems needed for the transition to renewable energy.

In this activity, we will, together with experts from the members, analyze the possible use cases of connecting OT to external systems, the possible risks of these use cases, and the best practice architecture for them. We will, in particular, look at connections to external parties for flexibility and congestions management, and at the use of data diodes.

Virtualization and containerization in the field

Virtualization and containerization are increasingly used in systems deployed in the field, such as distribution automation and substation automation systems. These technologies create new security risks, but also new opportunities for more secure architectures. They also create organizational challenges, as either engineers working on the field systems will need knowledge of these new technologies, or IT people will have to manage the systems remotely. 
 
In this activity, we will analyze the risks of the use of virtualization and containerization, and based on this develop security architectures that mitigate the risks and use the new opportunities.

Participation in CRA standardization 

In October last year, the European Commission adopted the Cyber Resilience (CRA), which sets security requirements for all products with digital elements. The CRA will apply from December 2027. In 2025, work will start on the harmonized standards for the CRA, which turns the essential cybersecurity requirements in the CRA into a more detailed technical standard. 

While manufacturers are responsible for implementing the CRA, it will have an impact on DSOs through the requirements on smart metering equipment. Smart meters and data concentrators could be considered as critical products under two categories: 

  • Hardware Devices with Security Boxes
  • Smart meter gateways and other devices for advanced security purposes
If they are considered critical, manufacturers must perform a stricter conformity assessment. Hence, it is important that DSOs make sure that the harmonized standards are reasonable. 

In this activity, ENCS will participate in the CEN/CLC JTC 13 / WG 9 groups that will develop standards for the above categories, to keep our members informed and represent the interest of DSO. 

Become an ENCS member

Are you interested in our cyber security programs? As an ENCS member, you can contribute to and learn from all our programs. Click below to learn more about our memberships.

Subscribe to our newsletter

"*" indicates required fields

This field is for validation purposes and should be left unchanged.