2935

Get a Live Demo

You need to see DPS gear in action. Get a live demo with our engineers.

White Paper Series

Check out our White Paper Series!

A complete library of helpful advice and survival guides for every aspect of system monitoring and control.

DPS is here to help.

1-800-693-0351

Have a specific question? Ask our team of expert engineers and get a specific answer!

Learn the Easy Way

Sign up for the next DPS Factory Training!

DPS Factory Training

Whether you're new to our equipment or you've used it for years, DPS factory training is the best way to get more from your monitoring.

Reserve Your Seat Today

Achieving NERC CIP Compliance with NetGuardian G6 RTUs

By Andrew Erickson

August 1, 2025

Share: 

If you operate a utility or manage critical infrastructure in the energy sector, you already understand the importance of NERC CIP compliance. These standards from the North American Electric Reliability Corporation (NERC) are designed to protect the bulk electric system (BES) from cyber threats. These requirements tend to grow more strict every year.

NERC CIP (Critical Infrastructure Protection) is not just a set of suggestions. It's a mandatory framework enforced across the United States, Canada, and parts of Mexico. Non-compliance can lead to hefty fines, operational disruptions, and even revoked operating privileges.

What makes NERC CIP especially challenging is its open-ended structure. The standards specify goals like protecting information in transit or controlling system access, but they rarely name specific technologies. This flexibility is intentional, but it often creates confusion:

  • Which devices in your network fall under CIP regulation?
  • What protocols should you use?
  • How do you prove compliance to auditors?

DPS Telecom utility clients have been navigating these exact questions. That's why many are upgrading their infrastructure with NetGuardian G6 RTUs, which include capabilities that map (as directly as possible) to key NERC CIP requirements. The G6 platform provides a strong technical foundation to help you meet and document your cybersecurity obligations.

Alarm data being sent to PRISM vs Central Station

Traditional RTUs and Legacy Equipment May Make You Non-Compliant

Many legacy RTUs and remote monitoring devices were developed before cybersecurity was a top concern. These devices were excellent at collecting data and triggering alarms, but they just weren't built with today's security standards in mind.

That's a problem when facing NERC CIP requirements like:

  • Encrypted data transmission
  • Multi-factor authentication
  • Port and service lockdown
  • Event logging and audit trail generation

Most older doesn't perform these important modern functions:

  • Support modern encryption protocols like TLS 1.2 or SSH
  • Provide centralized user authentication or access logging
  • Offer flexible firmware, making it hard to adapt to new security patches
  • Allow granularity in role-based access control

If your infrastructure still includes these older devices, maintaining NERC CIP compliance might not be possible.

Look for an RTU That Supports NERC CIP Compliance

To build a network that's both easier to audit and more secure, your remote telemetry and control hardware should check off the following checkboxes:

Encrypted Communication Protocols

Data should be protected both in transit and at rest. Devices should support modern encryption protocols like:

  • TLS 1.2 or higher for web interfaces and remote connections
  • SSH (Secure Shell) for secure command-line access
  • SNMPv3 for encrypted SNMP traffic

Role-Based Access Control (RBAC)

Your system should support multiple user accounts with assignable roles. Not everyone needs admin-level access. Fine-grained permissioning helps limit exposure and aligns with CIP-007-6 R5.

Centralized Authentication

Support for RADIUS or similar authentication systems allows you to manage access centrally and revoke credentials easily. This can help you align with CIP-005-5 R2 and CIP-007-6 R5.

Secure Event Logging

RTUs should log all critical activity, including login attempts, config changes, firmware updates, and communication failures. Logs should be timestamped and exported for centralized review, which relates to CIP-007-6 R4.

Configurable Ports and Services

You should be able to disable unnecessary ports and services to reduce your attack surface. Compliance with CIP-007-6 R1 hinges on having only required services active.

Firmware Updates and Patch Management

You need the ability to apply security patches quickly (without replacing hardware). Devices should be field-upgradable and come from a vendor with responsive engineering support.

Secure File Transfers

Whether updating configurations or exporting logs, your RTU should allow secure transfers using SFTP, HTTPS, or other encrypted channels. You'll find this type of requirement in CIP-011-1 R1.2.

Get Support from a Vendor That Actually Understands Compliance

Hardware is only part of the picture. Your vendor should offer:

  • Detailed documentation
  • Firmware customization
  • On-demand support from engineers familiar with NERC CIP

NetGuardian G6 RTUs Help You Get There

DPS Telecom's NetGuardian G6 platform was engineered with all of the above criteria in mind. The G6 gives you a compliance-ready foundation with a long list of capabilities that support your regulatory strategy.

NERC CIP Mapping for NetGuardian G6 RTUs

As I've described, the code is not explicit with particular technologies, so it is always open to interpretation. Still, I've written the following guidelines for you after reviewing the requirements documents and comparing that to our G6 capabilities.

CIP-005-5: Electronic Security Perimeter(s)

  • R2, Parts 2.1-2.3 - Interactive Remote Access
    NetGuardian G6 supports SSH and TLS 1.2, ensuring encrypted remote access. Centralized login via RADIUS and automatic timeout settings further reduce access risks.

CIP-007-6: System Security Management

  • R1 - Ports and Services
    G6 RTUs offer configurable settings to enable or disable ports and services. This gives you full control over what's exposed to the network.
  • R2 - Security Patch Management
    Since all G6 firmware is developed in-house at DPS, you get online access to updates and patches. That means no waiting for your vendor to beg a third-party developer for modifications and improvements.
  • R3 - Malicious Code Prevention
    G6 firmware is written for a proprietary embedded-C platform, rendering most general-purpose attacks useless.
  • R4 - Security Event Monitoring
    Detailed logging tracks all critical activity. You can export logs for centralized review or integrate with SIEM systems.
  • R5 - System Access Control
    The G6 supports multi-user RBAC and centralized RADIUS login, giving you full access control down to the individual user level.

CIP-011-1: Information Protection

  • R1.2 - Secure Data in Transit
    With TLS, SNMPv3, and SSH, all communication between your devices and the G6 RTUs can be encrypted, ensuring that sensitive telemetry data isn't exposed.

Why Custom Engineering Matters for Compliance

At DPS Telecom, we don't just make RTUs. We partner with you to help you solve real compliance problems.

Because we own our entire design and manufacturing process, we can customize NetGuardian RTUs at the firmware, software, or hardware level to meet your specific requirements. This flexibility is key when regulations change or new security threats emerge.

With DPS, you get:

  • In-house firmware development - Get feature enhancements and security patches quickly
  • Tailored interfaces - Support for your existing authentication tools, SNMP managers, or NMS systems
  • Documentation support - Clear, audit-ready configuration documentation to show inspectors how your setup aligns with NERC CIP
  • U.S.-based support engineers - You talk directly with the team that built your gear, not a generic call center

We follow the exact kind of "value stacking" that many business experts describe. We're not just selling boxes. We're creating irresistible offers by combining products, customization, and expert support to solve your full compliance puzzle.

Compliance Is Your Responsibility. Helping You Achieve It Is Ours.

Let's be clear: NERC CIP compliance is a shared effort. The responsibility to design, document, and enforce a compliant infrastructure always falls to the utility itself.

However, when you have the right technology partner, one that understands both compliance and field-ready reliability, that job gets a lot easier.

With NetGuardian G6 RTUs, you're not just collecting telemetry. You're building a system with:

  • Secure access controls
  • Encrypted data paths
  • Audit-ready logs
  • Custom firmware features
  • Real-time support when you need it

That's how you move from uncertain compliance to confident readiness.

Ready to Strengthen Your Compliance Infrastructure?

If you're evaluating your next steps toward NERC CIP readiness - or you're tired of the patchwork approach - it's time to see how NetGuardian G6 RTUs can help you build a secure, modern, and compliant monitoring infrastructure.

  • Request a live demo
  • Talk to a DPS engineer about your network
  • Get a compliance-focused system design

We'll listen to your specific goals and show you how G6 gear can be customized to meet them.

Contact DPS Telecom today at 1-800-622-3314 or email sales@dpstele.com
Let's make your compliance job easier.

Share: 
Andrew Erickson

Andrew Erickson

Andrew Erickson is an Application Engineer at DPS Telecom, a manufacturer of semi-custom remote alarm monitoring systems based in Fresno, California. Andrew brings more than 18 years of experience building site monitoring solutions, developing intuitive user interfaces and documentation, and opt...