Smart meters are designed to operate in the field for up to two decades, often with minimal maintenance.
As smart meters become more intelligent and connected, they are evolving into critical access points in modern energy infrastructure. Security discussions around these devices often centre on how data is transmitted, focusing on secure communication protocols. However, the data stored inside the meter often doesn’t receive similar attention.
Local meter storage holds sensitive energy data, including usage patterns, billing records, event logs, and firmware history. If compromised, this data can expose energy providers to privacy breaches, regulatory penalties, and customer distrust. Therefore, it is critical that the conversation around smart meter security addresses what happens to data at rest.
Data storage as a risk factor
Smart meters are designed to operate in the field for up to two decades, often with minimal maintenance. Over time, they continuously collect and store data on embedded memory systems. While this data is vital for grid optimisation and billing, it can also be exploited by attackers if not adequately secured.
That risk comes in several forms. If a device is physically accessed, sensitive data may be retrieved or tampered with. Attackers might also exploit software vulnerabilities to gain remote access to stored information, especially in meters without proper authentication or update mechanisms.
Even more subtly, attackers may try to corrupt stored data to disrupt operations, for example, altering consumption records to interfere with billing or manipulating logs to skew grid forecasts. In such cases, the breach may not even be detected until damage is already done.
In all scenarios, the cost to energy providers can be high: from reputational fallout and compliance failures to lost revenue and increased operational complexity.
The new regulatory landscape
We are in the midst of regulatory change when it comes to cybersecurity. In the European Union, the Cyber Resilience Act (CRA) is due to become law by 2027 and will significantly reshape how digital products, including smart meters are designed, deployed, and supported.
The CRA mandates that all products with digital elements be secure by design. That means devices must not be shipped with known vulnerabilities, must come configured securely by default, and must include mechanisms for ongoing maintenance, patching, and vulnerability management. This means that a smart meter is no longer considered ‘market-ready’ unless it is secure at launch and throughout its entire lifecycle.
This has major implications not just for EU-based manufacturers, but for any company looking to sell into the European market. Compliance with CRA will become part of the CE mark, meaning global meter providers must align with its provisions to maintain access to one of the world’s largest energy markets.
With similar regulatory frameworks, such as the U.S. Cyber Trust Mark and NIST-800 guideline series and NIST IR 7628 rev 1, are developing in parallel, there is a clear picture of what future cybersecurity expectations will look like for embedded energy devices around the world.
Embedding security: Building trust into smart devices
As smart devices become central to energy infrastructure, their security must be built on three key principles: confidentiality, integrity, and authenticity.
Confidentiality means protecting sensitive data. This includes encryption, but also secure storage of encryption keys, controlling who has access, and using safe communication channels, such as secure internet connections to keep data private.
Integrity ensures data remains accurate and systems function as intended. Features like secure booting, which only allows trusted software to run, and checks like hashing help prevent data loss or tampering, even during unexpected shutdowns.
Authenticity verifies that devices and updates come from trusted sources. Techniques like digital signatures and secure update processes prevent hackers from installing fake or harmful software while protecting a company’s intellectual property.
Another key point that needs attention is quantum computing. Developments in this space mean some of today’s widely used encryption standards may soon be vulnerable. While post-quantum cryptography is not yet commonplace in embedded systems, the industry is beginning to explore what long-term resilience looks like, particularly as meters are expected to remain in service for 15–20 years.
Securing smart meter storage at its core
The energy industry is entering an era where digital reliability is as important as physical resilience. Smart meters that offer strong storage security by design will stand out in procurement processes and deliver long-term value.
Utility companies need to ensure their smart meters are shielded with security measures that protect data across the device’s full lifecycle. For manufacturers, prioritising data storage integrity is a key differentiator that can lead to more conversions, increase market share, and ultimately, improve the bottom line.
Written by
Katja Hakoneva
Product Manager
Tuxera