Electric utilities don’t get the luxury of “we’ll take it down and rebuild.” 

 

When something smells wrong in an operational technology (OT) environment, you’re balancing safety, continuity, and investigation simultaneously. CIRCIA adds another pressure point for covered entities: certain cyber incidents may require reporting within 72 hours after you reasonably believe a covered cyber incident occurred. 
https://www.law.cornell.edu/uscode/text/6/681b 

 

You’re not being asked to solve the whole incident in 72 hours. You’re being asked to produce a defensible first narrative, supported by evidence, while the environment is still changing. 

 

Coverage indicators utilities should document 

Most utilities already live in a reporting world. 

 

Depending on your footprint and responsibilities, you may already operate under some combination of: 

  • North American Electric Reliability Corporation (NERC) reliability standards 
  • Department of Energy (DOE) reporting expectations 
  • state public utility commission oversight 
  • sector-driven incident coordination 

 

Those relationships matter because they often intersect with CIRCIA applicability discussions, especially for organizations supporting Bulk Electric System (BES) cyber systems, transmission operations, or distribution infrastructure with essential service impacts. 

 

CISA’s three-step covered entity framework is still the cleanest way to document your logic, even if your final answer is “likely, but depends on structure.” 
https://www.cisa.gov/sites/default/files/2024-05/24-0630-Covered-Entity-Infographic-04242024-508c.pdf 

 

Two utility anchors that help frame “reuse, don’t reinvent” readiness: 

 

NERC CIP-008-6 (incident reporting and response planning expectations for BES Cyber Systems) 
https://www.nerc.com/globalassets/standards/reliability-standards/cip/cip-008-6.pdf 

 

DOE OE-417 (Electric Emergency Incident and Disturbance Report program) 
https://doe417.pnnl.gov/ 

 

If you want one practical deliverable for leadership, build a short coverage memo and keep it updated: 

  • What operational systems do you run 
  • What category of infrastructure do you support (BES, distribution, generation, control center operations) 
  • What you already reported today (and where) 
  • Which vendors or shared providers hold evidence you may need during incidents 

 

Step-by-step guide: 
circia-covered-entity-quick-test 

 

Context across sectors: 
circia-healthcare-72-hour-ready 

 

OT vs. IT incidents: why triage works differently 

OT response is not “IT response, but in a substation.” 

 

The priorities are different, the constraints are real, and the cost of the wrong containment move can be high. 

 

NIST’s ICS security guidance explains why incident response in OT environments requires its own playbook. 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf 

 

Here’s what changes in practice: 

 

Safety comes first 

Certain actions that are fine in IT can create operational risk in OT. A fast isolate-and-wipe approach can interrupt monitoring, automation, or protective functions, sometimes in ways that ripple. 

 

Availability isn’t negotiable 

Utilities must maintain continuous delivery. Even a “small” operational disruption can affect large geographic areas, critical services, and restoration timelines. 

 

Systems are specialized, fragile, and often legacy 

You can’t always patch on demand. You can’t always scan aggressively. Some devices have narrow tolerance for change, restarts, or traffic spikes. 

 

Evidence can be easy to destroy by accident 

OT logging can be limited. Historians roll over. Devices overwrite buffers. And well-intentioned recovery steps can erase the very artifacts you need to explain what happened. 

 

CISA’s recommended practice for ICS incident response is a strong reality check for coordination between engineering and security teams. 
https://www.cisa.gov/sites/default/files/2023-01/final-RP_ics_cybersecurity_incident_response_100609.pdf 

 

CISA’s “Seven Steps” paper is also worth keeping in your runbook, especially for segmentation and remote access discipline. 
https://www.cisa.gov/sites/default/files/documents/Seven%20Steps%20to%20Effectively%20Defend%20Industrial%20Control%20Systems_S508C.pdf 

 

One small operational detail that matters: decide in advance who has authority to approve containment actions that could affect operations. In the moment, you don’t want engineering and security negotiating risk in a hallway. 

OT evidence capture checklist 

 

In OT, the fastest investigations are usually the ones that don’t start from scratch. 

 

Your goal is to know, ahead of time, what evidence exists, who can pull it, and how quickly you can preserve it without disrupting operations. 

 

NIST SP 800-82 emphasizes the importance of monitoring and logging across control system environments, even when telemetry is constrained. 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf 

 

A practical OT evidence packet often includes: 

Historian data 

Time-series data can show abnormal behavior that aligns with suspected intrusion windows, device changes, or operational anomalies. 

Alarm and event logs 

Control system alerts and sequence-of-events logs can provide early indicators, sometimes before IT tools show anything meaningful. 

Engineering workstation logs 

Engineering workstations are high-value targets. If a workstation is compromised, configuration changes can follow quickly. 

Remote access records 

If vendors or remote operators access OT systems, you want session records, authentication logs, and timestamps you can reconcile. 

Network telemetry 

Even partial visibility helps. Baseline traffic patterns, unusual connections between substations, or unexpected communications can anchor your timeline. 

 

If you need a broader library of ICS recommended practices to help formalize what you collect and how, CISA maintains a strong reference set here: 
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices 

 

For log retention and integrity concepts that support investigation credibility, NIST SP 800-92 is still one of the clearest foundations: 
https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-92.pdf 

 

Building a 72-hour narrative for operational impact 

CIRCIA’s 72-hour reporting requirement is tied to when you reasonably believe a covered cyber incident occurred. 
https://www.law.cornell.edu/uscode/text/6/681b 

 

For utilities, the narrative needs to do more than describe “malware on a system.” It needs to explain the operational impact and stay consistent as facts develop. 

 

Start by documenting four things early: 

Service disruptions 

Examples include: 

  • customer outages 
  • disruptions to grid monitoring or control center visibility 
  • failures or degradation in operational control systems 

Systems affected 

Be explicit about scope boundaries: 

  • OT control systems vs corporate IT 
  • vendor-managed infrastructure vs utility-owned systems 
  • control center vs substation vs field assets 

Mitigation and containment actions 

Time-stamp what you did and why, especially if actions were chosen to protect safety and continuity: 

  • isolating specific segments 
  • switching to backup control capabilities 
  • restricting remote access 
  • restoring operational services in phases 

Restoration status and what you still don’t know 

A short sentence that says “scope still evolving” is better than a confident statement you have to walk back later. 

 

CISA’s one-pager on covered cyber incidents is useful for explaining why availability and operational disruptions can be quickly qualified, especially in critical infrastructure environments. 
https://www.cisa.gov/sites/default/files/2024-05/24-0630-CCI-One-Pager-20240410-2-508c.pdf 

 

If your teams already use DOE OE-417, the form itself is a helpful writing model. It’s structured around what happened, operational impacts, mitigations, and current status, which maps well to what leaders and regulators tend to ask for. 
https://doe417.pnnl.gov/files/DOE-417_Form.pdf 

 

No action needed on your side if you’re reading this as planning material. The win is building a narrative format you can reuse under pressure. 

Tabletop scenario: suspected OT intrusion with partial visibility 

OT incidents often start with incomplete data. That’s normal. The right test scenario assumes it upfront. 

 

Example tabletop: 

  • Hour 3: Monitoring identifies abnormal communication between substations. 
  • Hour 12: Engineers detect unexplained configuration changes in several devices. 
  • Hour 24: Investigation confirms unauthorized remote access to an engineering workstation. 

 

At this stage, your organization may “reasonably believe” an incident has occurred, and the reporting clock may begin. 
https://www.law.cornell.edu/uscode/text/6/681b 

 

Measure outcomes that matter, not just whether the tabletop felt realistic: 

 

Time to operational impact assessment 
How long does it take to determine whether power delivery systems are affected? 

Time to incident narrative 
How quickly can you produce a preliminary summary that leadership can trust? 

Evidence packet completeness 
Can you assemble historian data, alarms, workstation logs, and remote access records without disrupting operations? 

 

CISA tabletop exercise packages: 
https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages 

Sector-wide exercise context for electric utilities: GridEx (E-ISAC) 
https://www.eisac.com/s/gridex 

A useful add-on to the tabletop: requires a “decision log” output. One page. Time-stamped. Who approved what, and why. That document saves hours later, especially when you’re trying to reconcile operational decisions with investigation and reporting needs. 

Conclusion: operational resilience depends on preparation 

Electric utilities operate infrastructure that the public depends on every minute of the day. When cyber incidents affect operational systems, the consequences can touch public safety, economic stability, and trust. 

 

CIRCIA reinforces a practical requirement for covered entities: accelerated reporting timelines and structured early documentation. 
https://www.law.cornell.edu/uscode/text/6/681b 

 

Utilities that do best with this aren’t the ones that chase a perfect story on the first day. They’re the ones who can do three things quickly: 

  • Document coverage logic without hand-waving 
  • Preserve OT evidence without disrupting operations 
  • Produce a clear, operationally grounded narrative within the first 72 hours 

 

Check your CIRCIA Readiness with this free assessment