Strengthening Low Impact BES Cyber System Access with Identity-Centric Zero Trust
CIP-003-11 is the latest evolution of NERC’s Security Management Controls standard for the Bulk Electric System. At a high level, the standard continues to define governance and accountability expectations for BES Cyber Systems, but the practical significance of this update is its stronger focus on low impact BES Cyber Systems, especially the way utilities control electronic access into and around those environments.
FERC approved CIP-003-11 in March 2026, describing it as a set of new baseline cybersecurity safeguards for low impact BES Cyber Systems. NERC’s implementation plan gives entities thirty-six months from regulatory approval to comply with the malicious-communications detection provision on a later date tied to April 1, 2029 or the standard’s effective date, whichever is later.
What changed matters. The industry has long recognized that while low impact sites may not carry the same individual criticality as medium or high impact environments, they can still present meaningful system-wide risk, particularly when many distributed sites are exposed through inconsistent remote access, vendor connectivity, and weak authentication practices. That concern is reflected in the background to Project 2023-04, where NERC points directly to the Low Impact Criteria Review Team and the need to address the risk of coordinated cyberattacks across low impact BES Cyber Systems. The result is a revised standard that consolidates and strengthens electronic access expectations for low impact environments.
For utilities, the message is straightforward: CIP-003-11 is not a paperwork revision. It is an architectural signal. The standard now places more emphasis on controlling which communications are allowed, authenticating each user before access is granted, protecting authentication data in transit, and maintaining operational control over vendor electronic access.
The center of gravity of the update sits in the low impact cyber security plan requirements, specifically the electronic access controls that govern how users and third parties reach networks containing low impact BES Cyber Systems or the shared cyber infrastructure that supports them. This is where Xage can help.
Xage helps utilities modernize access into low impact BES Cyber System environments by replacing broad, tunnel-based trust with identity-centric, policy-driven Zero Trust access. Instead of giving users broad network access through a VPN and then trying to constrain activity afterward, Xage enforces access at the user, asset, application, and session level from the outset. Xage Secure Remote Access (SRA) is designed to provide least-privilege connectivity, browser-based or native application access, and layered protection across operational environments.
Why this matters under CIP-003-11
The revised standard calls for utilities to permit only necessary inbound and outbound electronic access where routable connectivity reaches a low impact asset or the shared infrastructure that supports it. In practical terms, that means utilities need tighter control over who can connect, what they can reach, and how far that access should extend. Xage addresses this directly by enforcing fine-grained access down to the individual asset and application level rather than exposing broad network segments. Xage also supports native OT tools such as Studio 5000 and ROClink without requiring traditional VPN-based access or broad firewall openings, which is especially useful in operational environments where engineering workflows must remain intact.
The standard also now requires that each user be authenticated before being permitted access to the network containing low impact BES Cyber Systems. That is an important shift because it pushes security decisions forward in the connection path. Xage aligns well with that intent through SSO, MFA, support for multiple identity providers, and policy enforcement before users are allowed deeper into the environment. Xage also supports additional MFA challenges at subsequent layers, devices, applications, and workloads, which is particularly valuable in multi-zone utility architectures.
CIP-003-11 also places explicit emphasis on protecting authentication information in transit. Xage supports that objective through encrypted access paths and through a design that centralizes secure authentication workflows rather than distributing credentials broadly across endpoints, vendors, and jump systems. In a utility environment, that improves both security hygiene and operational consistency.
Vendor access is another area where the update is materially stronger. Utilities are now expected to maintain a method for determining vendor electronic access and a method for disabling it. Xage was built for exactly this operational challenge. It enables secure onboarding and management of vendors, contractors, and partners; supports just-in-time access; allows credentials to be revoked automatically after task completion; and provides session monitoring, recording, and tamper-proof logs that show who accessed what, when, and under what policy. For utilities that rely on OEMs, integrators, relay specialists, or field support providers, this moves vendor access out of the realm of loosely governed exceptions and into a controlled, auditable operating model.
How Xage aligns to the key CIP-003-11 control areas
| CIP-003-11 control area | What the standard is driving toward | How Xage helps |
| Necessary electronic access | Limit routable inbound and outbound access to only what is needed for low impact environments | Xage enforces least-privilege access at the asset and application level, avoiding broad VPN-style exposure and reducing unnecessary network reachability. |
| User authentication before access | Ensure users are authenticated before they are allowed into networks containing low impact BES Cyber Systems | Xage provides SSO, MFA, multiple IdP support, and policy-driven access decisions before the user proceeds deeper into the environment. |
| Protection of authentication data in transit | Secure the authentication process as credentials and tokens move across access paths | Xage uses encrypted access flows and controlled authentication paths that reduce exposure of credentials across remote access workflows. |
| Vendor access governance | Know when vendor access is active and maintain control over that access | Xage supports just-in-time access, automatic credential revocation, centralized policy control, session monitoring, and audit-quality visibility. |
| Secure movement across layered environments | Preserve segmentation while allowing controlled access through utility architectures | Xage’s multi-hop architecture enforces protocol and session termination at each network boundary so no direct connection traverses multiple zones. |
| Auditability and operational evidence | Maintain evidence of access activity for compliance, investigations, and internal review | Xage provides tamper-proof audit logs, policy-driven session recording, and analytics through Xage Insights. |
| Controlled file movement | Reduce risk around moving files into sensitive operational environments | Xage enables encrypted file sharing with malware scanning and file integrity verification, giving utilities a more controlled way to move engineering files, patches, and supporting data. |
The architectural value for utilities
The most effective way to read CIP-003-11 is not as an isolated checklist, but as a push toward a more disciplined low impact access architecture. NERC’s own rationale and implementation material make clear that the update was driven by concern over coordinated attacks on distributed low impact assets and by the need to consolidate and strengthen electronic access requirements. In practice, that means utilities should be looking for an access layer that authenticates users early, limits reach precisely, preserves segmentation, governs vendor access tightly, and leaves behind defensible evidence.
Xage is well suited to that role. Its multi-hop architecture is especially relevant in utility networks because it enforces protocol and session termination at each network boundary, ensuring that no direct connections traverse multiple zones. That preserves defense-in-depth and minimizes the need to open inbound firewall ports while still allowing utilities to support remote engineering, vendor maintenance, privileged access, and modern operational workflows.
Xage value to a CIP-003-11 program
For utilities preparing for CIP-003-11, Xage provides a practical way to modernize low impact electronic access without compromising operational usability. It helps utilities move from broad network trust to identity-based access, strengthen pre-access authentication, improve governance of vendor connectivity, preserve segmentation across layered environments, and generate the audit-quality evidence expected in regulated infrastructure. That combination is exactly why identity-centric Zero Trust access has become so important in modern utility cyber programs.
For a deeper look at how to implement these controls in practice, download the Xage solution brief for NERC CIP-003-11.


