Skip to main content

Cybersecurity and Resilience

Securing today's electric grid from cyber-attack is more complex than ever. Although there is no shortage of vendors offering solutions, objective voices are hard to come by. That's why researchers at NREL are evaluating cyber solutions for the electric grid today as well as the future—adopting a whole-systems, long-term, and all-hazards approach. 

Text version

NREL's cybersecurity team at the Energy Systems Integration Facility is providing utility companies across the country with site assessments to evaluate existing security controls, identify gaps, and offer prioritized action items to improve organizational protocols. The team is also helping energy-sector companies that specialize in wind, solar, smart buildings, electric vehicles, energy storage, and other distributed energy resources (DERs) to improve system- and device-level cybersecurity through product evaluation, DER security standards expertise, and technology research and development.


Cybersecurity Technology R&D

NREL is conducting research to identify, detect, and protect against the biggest threats to today's energy grid to design a more resilient energy system for tomorrow.


Distributed energy security standards

NREL and Sandia are leading working groups and accelerating codes and standards development through in-person and virtual participation, as well as conducting the technical R&D activities required to validate test procedures and recommendations.

Vendor product cybersecurity evaluations

NREL's cybersecurity experts evaluate microgrid controllers, inverters, wind controllers, security devices, electric vehicle charging stations, and energy storage systems.

Site security assessments

NREL's cybersecurity team offers partners thorough, confidential assessments to evaluate the security controls in place and provide a prioritized list of action items for gaps in security controls.

Security architectures

Our layered defense architecture addresses network security through a combination of network segmentation, role-based access control, intrusion detection, in-line blocking, and end-point security.


Jonathan White | 303-384-7433

Leverage our cybersecurity research capabilities

work with us