/regulations

EPA Regulations for Energy / Utilities in Michigan

Explore key EPA regulations impacting Michigan's energy and utilities sector for compliance and sustainability insights.

Contact Us

Reviewed by Jeff Harms

Director, Advisory Services at OCD tech

Updated June, 19

Michigan EPA Main Criteria for Energy / Utilities

Explore Michigan EPA's key energy and utilities criteria, ensuring compliance, sustainability, and efficient resource management for environmental protection.

 

Michigan Critical Infrastructure Protection

 

  • Quarterly vulnerability assessments of all SCADA systems and Industrial Control Systems (ICS) with special focus on the Great Lakes Energy Grid vulnerabilities
  • Documentation of all cross-connections to Michigan's water systems following the Flint crisis protocols and EPA Region 5 requirements
  • Specific cold weather resilience testing for energy systems operating in Upper Peninsula's severe winter conditions

 

 

Great Lakes Water Protection Standards

 

  • Implement multi-factor authentication for all remote access to water treatment facility controls per Michigan EGLE requirements
  • Conduct annual tabletop exercises simulating cyber attacks on water systems that could impact the Great Lakes Basin
  • Maintain separated networks between business systems and operational technology managing water treatment chemicals

 

 

Energy Grid Segmentation

 

  • Deploy network monitoring tools capable of detecting anomalies specific to Michigan's renewable energy integration points
  • Implement zero-trust architecture for all connections between legacy systems and modern grid infrastructure
  • Document all third-party vendor access points to Michigan's energy distribution systems

 

 

Michigan-Specific Incident Response

 

  • Establish direct communication channels with the Michigan Public Service Commission (MPSC) for coordinated incident response
  • Create response procedures for extreme weather events that may coincide with cyber attacks
  • Develop regional mutual aid agreements with neighboring utilities across state lines

 

 

Supply Chain Risk Management

 

  • Verify compliance of all technology vendors with Michigan's Critical Infrastructure Protection standards
  • Conduct annual reviews of all Canadian cross-border utility suppliers serving Michigan's northern regions
  • Implement hardware verification for all components used in Great Lakes hydroelectric facilities

 

 

Regulatory Compliance Reporting

 

  • Submit quarterly compliance reports to Michigan EGLE for water systems and MPSC for energy systems
  • Maintain documentation of all security measures protecting critical infrastructure against threats specific to the region
  • Conduct annual compliance audits aligned with Michigan's Infrastructure Security requirements and EPA Region 5 guidelines

 

Secure Your Business with Expert Cybersecurity & Compliance Today
Contact Us

Achieve Michigan EPA for Energy / Utilities with OCD Tech—Fast & Secure

Don’t let security gaps slow you down. Partner with OCD Tech’s seasoned cybersecurity experts to tailor a robust, framework-aligned protection plan. From uncovering hidden vulnerabilities to mapping controls against EPA, we’ll streamline your path to certification—and fortify your reputation.

What is...

What is Michigan EPA for Energy / Utilities

Michigan EPA Cybersecurity Framework for Energy & Utilities

 

In Michigan, the Environmental Protection Agency (EPA) collaborates with the Michigan Public Service Commission (MPSC) and Michigan Department of Environment, Great Lakes, and Energy (EGLE) to oversee cybersecurity regulations for energy and utility providers. This specialized framework addresses the unique threats facing Michigan's critical infrastructure.

 

Michigan-Specific EPA Cybersecurity Requirements

 

  • Great Lakes Energy Grid Protection Protocol - Specific to Michigan's position managing critical water-energy infrastructure around the Great Lakes, requiring enhanced security monitoring for water treatment facilities and hydroelectric operations
  • Michigan Critical Infrastructure Cybersecurity Framework (MCICF) - A state-specific adaptation of NIST guidelines with additional requirements for energy providers operating in Michigan's unique cross-border environment with Canada
  • Upper Peninsula Power Security Standards - Special provisions for the isolated grid systems in Michigan's Upper Peninsula, requiring more robust offline backup systems due to extreme weather conditions
  • Michigan Energy Data Protection Act compliance - State-specific regulations governing how utility companies must protect customer usage data and energy consumption patterns

 

Key Threats to Michigan Energy Utilities

 

  • Industrial Control System (ICS) attacks - Hackers targeting the specialized computers that control power generation and distribution across Michigan's widespread rural and urban areas
  • Great Lakes shipping channel disruptions - Cyber threats to navigation systems affecting coal and natural gas deliveries to Michigan power plants
  • Winter storm response systems - Attacks targeting emergency response coordination during Michigan's severe winter weather events that could disable power restoration efforts
  • Cross-border grid vulnerabilities - Michigan's interconnected power systems with Ontario create unique security challenges requiring specialized monitoring

 

Essential Protection Measures

 

  • Michigan Energy Cybersecurity Assessment Tool (MECAT) - A state-specific evaluation system required for all utility providers to assess vulnerability to regional threats
  • Operational Technology (OT) isolation - Physical and digital separation of systems controlling critical infrastructure from regular business networks
  • Multi-factor authentication (MFA) - Requiring multiple verification methods before granting access to sensitive utility control systems
  • Regional threat intelligence sharing - Participation in the Michigan Energy Security Coalition (MESC) to receive alerts about emerging threats specific to Midwestern energy infrastructure

 

Michigan EPA Reporting Requirements

 

  • 72-Hour Breach Notification - Michigan utilities must report cybersecurity incidents to both federal EPA and the MPSC within 72 hours, faster than the national standard
  • Quarterly Vulnerability Assessments - Regular testing requirements specifically addressing seasonal vulnerability changes (winter grid stress, summer peak demand)
  • Annual Great Lakes Water-Energy Security Review - Specialized assessment for utilities with operations affecting Great Lakes water quality
  • Michigan Critical Infrastructure Registry - Mandatory registration and security status reporting for all energy assets deemed critical to state operations

 

Michigan EPA Compliance Assistance

 

  • Michigan Energy Cybersecurity Assistance Program (MECAP) - State-funded technical support for smaller regional utilities to meet compliance requirements
  • Tabletop Exercise Program - Michigan-specific disaster response simulations addressing regional scenarios like coordinated attacks during polar vortex events
  • Michigan Rural Utility Cybersecurity Consortium - Specialized resources for small providers serving Michigan's extensive rural communities
  • Great Lakes Energy-Water Security Grant Program - Funding for security improvements at facilities where energy production intersects with water resource management

 

Recent Michigan-Specific Developments

 

  • Michigan Grid Modernization Security Initiative - New requirements for securing smart grid deployments throughout the state, with emphasis on weather resilience
  • Northern Michigan Microgrid Security Standards - Specialized protocols for the increasing number of community microgrids being deployed in northern Michigan communities
  • EPA-EGLE Joint Enforcement Actions - Increased coordination between federal and state agencies on cybersecurity enforcement specific to utilities with environmental impact potential
  • Michigan Energy Data Privacy Enhancement Act - New regulations expanding consumer protections for smart meter data collected by Michigan utilities

 

For Michigan energy utilities, cybersecurity compliance isn't just about following generic national standards - it requires addressing the state's unique position as a Great Lakes state with extreme weather patterns, cross-border energy exchanges, and critical water-energy infrastructure. Working with both EPA and Michigan-specific regulatory bodies ensures comprehensive protection of these essential services.

Read More

Looking for compliance insights across other regions, industries, and regulatory frameworks? Explore our collection of articles covering key compliance requirements and best practices tailored to different sectors and locations.

SOC 1

New Jersey

Legal / Accounting / Consulting

SOC 1 Regulations for Legal / Accounting / Consulting in New Jersey

Explore SOC 1 regulations for legal, accounting, and consulting firms in New Jersey to ensure compliance and secure client trust.

Learn More

SOC 2

New Jersey

Insurance

SOC 2 Regulations for Insurance in New Jersey

Explore SOC 2 regulations for insurance in New Jersey to ensure compliance and data security in the insurance industry.

Learn More

FERC Standards

Florida

Energy / Utilities

FERC Standards Regulations for Energy / Utilities in Florida

Explore FERC standards and regulations shaping Florida's energy and utilities sector for compliance and efficiency.

Learn More

RCRA

Texas

Energy / Utilities

RCRA Regulations for Energy / Utilities in Texas

Explore key RCRA regulations impacting Texas energy and utilities for compliance and environmental safety.

Learn More

CFATS

Texas

Energy / Utilities

CFATS Regulations for Energy / Utilities in Texas

Explore CFATS regulations for energy and utilities in Texas to ensure compliance and enhance facility security.

Learn More

ISO 13485

Florida

Pharmaceutical / Biotech / Medical Devices

ISO 13485 Regulations for Pharmaceutical / Biotech / Medical Devices in Florida

Explore ISO 13485 regulations for pharmaceutical, biotech, and medical devices in Florida to ensure compliance and quality management.

Learn More

Customized Cybersecurity Solutions For Your Business

Contact Us

Frequently asked questions

What services does OCD Tech provide?

OCD Tech offers a comprehensive suite of cybersecurity and IT assurance services, including SOC 2/3 and SOC for Cybersecurity reporting, IT vulnerability and penetration testing, privileged access management, social engineering assessments, virtual CISO (vCISO) support, IT general controls audits, WISP development, and compliance assistance for frameworks like CMMC, DFARS, and FTC Safeguards.

Which industries does OCD Tech serve?

OCD Tech specializes in serving highly regulated sectors such as financial services, government, higher education, auto dealerships, enterprise organizations, and not-for-profits throughout New England.

How long does an IT security assessment take?

Typically, OCD Tech’s on-site work spans 1–2 days, depending on complexity and number of sites, followed by 1–2 weeks of analysis and reporting to deliver clear, actionable recommendations.

Why should I get SOC 2 compliant?

SOC 2 reporting demonstrates to clients and prospects that an organization follows best-in-class controls over security, availability, processing integrity, confidentiality, and privacy—boosting trust, meeting RFP/due diligence requirements, and helping secure contracts. OCD Tech helps organizations achieve and maintain this compliance.

Can OCD Tech help me with federal cybersecurity regulations?

Yes—OCD Tech provides guidance for compliance with DFARS (NIST 800‑171), CMMC (Levels 1–3), and FTC Safeguards, ensuring organizations meet specific government or industry-based cybersecurity mandates.

What is a virtual CISO (vCISO), and do I need one?

A virtual CISO delivers strategic, executive-level cybersecurity leadership as a service. OCD Tech’s vCISO service is ideal for organizations lacking a full-time CISO and helps build programs, define policy, oversee risk, and guide security maturity.

Does OCD Tech offer ongoing security training or audits for staff?

Absolutely. OCD Tech provides tailored internal IT Audit training and security awareness sessions, plus annual reviews of Written Information Security Programs (WISP), such as Massachusetts 201 CMR 17 and other state or industry-specific controls.

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships