NERC CIP Version 7 (CIP-003-9 and associated standards) represents the most significant expansion of NERC CIP's scope since Version 5. The changes that utilities are underestimating: the expansion of mandatory security controls to low-impact Bulk Electric System (BES) Cyber Systems, the new supply chain risk management requirements under CIP-013-2, and the tightening of physical security requirements for transient cyber assets.
The utility industry's traditional approach to NERC CIP compliance — point-in-time audit preparation with a compliance team separate from engineering — is structurally incapable of satisfying the continuous compliance requirements that CIP-013-2 and the expanded low-impact obligations create.
CIP-003-9: What Changed for Low-Impact Assets
CIP-003-8 required utilities to have a policy for low-impact BES Cyber Systems, covering physical security controls, electronic access controls, and incident response. CIP-003-9 goes further: it requires specific controls for transient cyber assets (laptops, removable media, industrial routers) used at low-impact sites, with documented malicious code prevention measures and documented authorization controls for transient device use.
For utilities with large distributed asset footprints — hundreds of substations, remote generation sites, pipeline control facilities — the low-impact obligation represents a compliance surface area that is orders of magnitude larger than the high-impact and medium-impact obligations that historically received compliance investment. Implementing transient device controls across a distributed OT environment is an operational technology engineering problem, not a policy writing problem.
The enforcement risk under CIP Version 7 is asymmetric: violations related to low-impact assets generate penalties under a different penalty matrix than high-impact violations, but the total penalty exposure is larger because the number of potentially non-compliant assets is larger. A utility with 400 substations classified as low-impact has 400 potential violation sites rather than the handful of high-impact control centers. One systemic gap in transient device controls across all 400 sites is 400 separate violations.
CIP-013-2: Supply Chain Risk Management
CIP-013-2 requires utilities to develop and implement a supply chain risk management plan for industrial control system hardware, software, and services associated with BES Cyber Systems. The plan must address: notification of vendor-identified security vulnerabilities, verification of software integrity and authenticity, coordination of controls for remotely-accessible third-party software, and disclosure of known industrial control system vulnerabilities by vendors.
The implementation gap: most utilities have vendor contracts. They don't have processes to verify software integrity before installation, or to systematically receive and respond to vendor vulnerability notifications. CIP-013-2 requires a process, not just a policy — and the process must be evidenced.
The Continuous Compliance Architecture
Point-in-time compliance for NERC CIP means: run the compliance evidence collection process before the audit window, assemble the evidence package, submit, then return to normal operations until the next audit. The problem with this model is that it produces compliance snapshots, not continuous compliance — and NERC enforcement investigations triggered by incidents or complaints examine the period before the audit, not just the audit window.
- Implement automated asset inventory for BES Cyber Systems — the asset list must be accurate at all times, not at audit time
- Build transient device authorization workflows as a formal IT service — not ad hoc permission grants
- Implement automated vulnerability notification routing from ICS vendors to the responsible security engineer
- Build patch management SLAs for ICS patches — the 35-day patching requirement (CIP-007) requires a process, not just a timeline
- Implement continuous monitoring for Electronic Security Perimeter (ESP) access — alerts on unexpected access patterns, not just access logs
- Run tabletop exercises for CIP-008 (Incident Reporting) at least annually — the reporting timeline starts from classification, not from discovery
Our compliance infrastructure and regulatory intelligence services have worked with utilities on CIP compliance architecture. The engagement model that works: map the current compliance architecture against the CIP control requirements, identify the automated evidence collection gaps, and build the tooling that makes continuous compliance an output of normal operations.
EU AI Act: What CTOs Actually Need to Do Before August 2026
DORA Is Live. Here's What 'Operational Resilience' Means for Your Codebase
FedRAMP Rev 5: What Changed and Why Most Current ATO Holders Are Already Non-Compliant
The engineering behind this article is available as a service.
We have done this work — not advised on it, not reviewed documentation about it. If the problem in this article is your problem, the first call is with a senior engineer who has solved it.