Securing the future of energy storage: Navigating the cybersecurity landscape

By Katherine Hutton, Cybersecurity product manager, Fluence
LinkedIn
Twitter
Reddit
Facebook
Email

Katherine Hutton, product manager of cybersecurity at Fluence, discusses why cybersecurity is critical for battery storage systems and how to navigate this increasingly complex area.

Battery energy storage systems (BESS) have moved from emerging technology to a critical part of national energy strategies. In Australia, they are already integral to balancing the National Electricity Market (NEM), enabling greater penetration of renewable energy generation, and improving grid reliability.

Globally, growth is accelerating at significant rates: over the next five years (2025-2029), BESS deployment is expected to grow at 30% annually in the United States, 45% in the European Union (EU), and 20–25% across Japan, South Korea, Southeast Asia, and India.

This expansion is happening in parallel with a continued transformation in how operational technology (OT) is designed and managed. Instead of physically walking through facilities to check levels, pumps, and valves, operators can now rely on advanced software tools for analytics and visualisation.

This article requires Premium SubscriptionBasic (FREE) Subscription

Enjoy 12 months of exclusive analysis

Not ready to commit yet?
  • Regular insight and analysis of the industry’s biggest developments
  • In-depth interviews with the industry’s leading figures
  • Annual digital subscription to the PV Tech Power journal
  • Discounts on Solar Media’s portfolio of events, in-person and virtual

Or continue reading this article for free

Today’s grid infrastructure is increasingly digital, interconnected, and remotely controlled – a shift that brings significant efficiency and flexibility but also demands a strong, proactive approach to cybersecurity.

The global shift in policy and standards

Governments and industry bodies are moving to establish consistent security expectations for critical infrastructure. In a landmark move, Australia has adopted the ISA/IEC 62443 series as national standards for protecting operational technology.

Developed by the International Society of Automation (ISA) and International Electrotechnical Commission (IEC), this framework outlines how security should be integrated into industrial automation and control systems throughout their lifecycle.

Its modular, role-based approach allows asset owners, service providers, and equipment suppliers to apply the sections relevant to their responsibilities, ensuring alignment without prescribing a one-size-fits-all checklist.

Internationally, other governments are moving in a similar direction to define cybersecurity requirements for critical infrastructure and a broader scope of industries. In the European Union, the NIS2 Directive extends security requirements to a wider range of energy assets, including smaller-scale energy storage, while the Cyber Resilience Act will, from December 2027, require that all products with digital elements meet lifecycle security obligations.

In the United States, both federal and state measures are increasing scrutiny of supply chain integrity, remote access security, and vendor accountability. These policies vary in detail but converge on the same principle: cybersecurity must be part of the design and procurement process, not an afterthought.

Understanding the risk environment

The operational role and architecture of BESS determine how security must be managed. Cyber-capable components such as battery management systems (BMS), power conversion systems (PCS), and energy management systems (EMS) each contain software and communications pathways that require secure maintenance throughout the system’s life.

These elements demand greater scrutiny than passive components like battery cells or structural parts. Remote access is essential for performance optimisation and troubleshooting, but it must be governed by strict protocols to prevent misuse.

Similarly, global supply chains support rapid scaling but can obscure visibility into the origins and update histories of components, making transparency critical.

Recent investigations have uncovered troubling cases of undocumented communication features in power electronics, illustrating how supply chain opacity can conceal security vulnerabilities.

In response, several countries have moved to restrict or remove certain manufacturers’ equipment from critical infrastructure, underscoring that supply chain risks are not hypothetical but active concerns.

This does not mean storage systems are inherently unsafe. In fact, BESS offers a unique opportunity for resilience. Unlike legacy grid infrastructure, which can be difficult and costly to secure after deployment, battery storage can be designed with cybersecurity built in from the outset.

When properly protected, BESS can strengthen overall grid resilience by providing reliable backup power and stabilisation during disruptions affecting other grid assets. Well-secured energy storage, therefore, is not merely a risk to manage but a critical part of the cybersecurity solution.

Best practices to reduce cyber risk

While each BESS project is unique, certain foundational measures can greatly reduce exposure to cyber threats. Drawing on lessons from across the industry, these practices address common vulnerabilities and can help enable secure and resilient systems over decades of operation.

  • Maintain detailed hardware and software bills of materials (HBOMs and SBOMs). These inventories identify every component and its source, enabling vulnerability tracking, verification of trusted suppliers, and faster supply chain incident response mitigation
  • Design with defensible architecture and segmentation. Avoid ‘flat’ networks that allow unrestricted communication between devices. Segmentation limits the potential impact of any compromise and ensures systems can default to a safe state if needed.
  • Implement secure remote access. Use role-based permissions, multi-factor authentication, and activity logging. Avoid shared accounts and default credentials, and review access permissions regularly.
  • Enable continuous network visibility and monitoring. Monitor both internal device-to-device communications and external connections to detect anomalies early and respond quickly.
  • Secure long-term software support and vulnerability management. Ensure contracts clearly define responsibilities for ongoing security updates, critical patching, and disclosure of vulnerabilities over the full life of the asset.

Integrating security from day one

Securing BESS is most effective when it is built in from the outset and sustained throughout the system’s life. By embedding strong protections early, operators can safeguard performance, avoid costly retrofits, and keep assets resilient as threats evolve. 

When security is built into every stage of development and operations, storage can operate as a trusted pillar of modern grids, supporting reliability, protecting investments, and enabling the energy transition to advance with confidence.


About the Author

Katherine Hutton is the product manager for cybersecurity at Fluence, where she develops solutions to strengthen cybersecurity capabilities across the company’s operational technology and digital products.

She stays at the forefront of evolving threats and global regulatory requirements affecting critical infrastructure asset owners, operators, and vendors in the renewable energy sector.

11 November 2025
San Diego, USA
The 2024 Summit included innovative new features including a ‘Crash Course in Battery Asset Management’, Ask-Me-Anything formats and debate-style sessions. You can expect to meet and network with all the key industry players again in 2025 from major US asset owners, operators, RTOs and ISOs, optimizers, software and analytics providers, technical consultancies, O&M technology providers and more.
24 February 2026
InterContinental London - The O2, London, UK
This isn’t just another summit – it’s our biggest and most exhilarating Summit yet! Picture this: immersive workshop spaces where ideas come to life, dedicated industry working groups igniting innovation, live podcasts sparking lively discussions, hard-hitting keynotes that will leave you inspired, and an abundance of networking opportunities that will take your connections to new heights!

Read Next

Most Popular

Email Newsletter