Skip to main content

Cybersecurity for SEL Devices — NERC CIP Compliance

By NFM Consulting 1 min read

Key Takeaway

How to secure SEL relays and RTAC for NERC CIP — password management, port hardening, access control, audit logging, DNP3 Secure Authentication, and firmware management.

Quick Answer

SEL devices at BES substations require NERC CIP compliance: change default passwords (CIP-007), disable unused ports and services, enable audit logging, implement DNP3 Secure Authentication for control commands, and manage firmware patches. SEL relays support these requirements through built-in security features.

NERC CIP Standards

  • CIP-005 — Electronic Security Perimeters
  • CIP-007 — Systems Security Management (ports, services, patches, logging)
  • CIP-010 — Configuration Change Management
  • CIP-013 — Supply Chain Risk Management

Hardening Steps

  • Change default passwords (1, 2, ACC → complex passwords)
  • Disable unused serial ports and protocols
  • Enable only required DNP3/Modbus/IEC 61850 services
  • Restrict Level 2 access to authorized personnel
  • Enable audit logging (SER records access attempts)

DNP3 Secure Authentication

SAv5 adds HMAC-SHA256 challenge-response to DNP3 control commands. See DNP3 SA guide. Also see OT cybersecurity and Modbus security for broader context.

Frequently Asked Questions

Ready to Get Started?

Our engineers are ready to help with your automation project.