A distributed cybersecurity system monitors security throughout the architecture to maintain data integrity, confi- dentiality, and authentication, and to facilitate nonrepudiation. Data critical for grid reliability and efficiency is delivered only to authorized agents, preventing unauthorized modifications, and guaranteeing that delivered information is authentic while it traverses through the infrastructure. Security in depth is provided through such mechanisms as: