ICS Security Guide Hits Street

Tuesday, July 5, 2011 @ 03:07 PM gHale


The final version of the Guide to Industrial Control Systems (ICS) Security should help pipeline operators, power producers, manufacturers, air traffic control centers and other managers of critical infrastructures to secure their systems while addressing unique performance, reliability, and safety requirements.

Finalized after three rounds of public review and comment, the National Institute of Standards and Technology’s (NIST) guide focuses on federally owned or operated industrial control systems (ICS), including those run by private contractors on behalf of the federal government. Examples include the mail handling operations, air traffic control towers, and some electricity generation and transmission facilities and weather observation systems. However, the guide’s potential audience is far larger and more diverse than the federal government, since 90 percent of the nation’s critical infrastructure is private.

RELATED STORIES
DHS Will Gain Power; Work with Private Sector
Talk to Me: Security In Action, or Inaction
Catalog of Control Systems Security Ready Now

The guide responds to responsibilities assigned to NIST under the Federal Information Security Management Act (FISMA), which directs NIST to develop information security standards and guidelines for non-national security federal information systems.

While these FISMA-related specifications are not mandatory for the private sector or state and local governments, many businesses and other organizations adopt the NIST-developed standards and guidelines. Users have downloaded drafts of the new document more than one million times, and the guide is already in industry-specific security publications.

Industrial control systems include supervisory control and data acquisition (SCADA) systems, distributed control systems and programmable logic controllers. The scope of facilities and equipment encompassed by these technologies range from broadly dispersed operations, such as natural gas pipelines and water distribution systems, down to individual machines and processes.

Most industrial control systems began as proprietary, stand-alone systems separated from the rest of the world and isolated from most external threats. Today, widely available software applications, Internet-enabled devices and other nonproprietary IT offerings integrate into most systems. This connectivity delivered many benefits, but it also has increased the vulnerability of these systems to malicious attacks, equipment failures and other threats.

As a rule, these systems must operate continuously and reliably, often around the clock. Unlike information technology (IT) systems, which process, store, and transmit digital data, industrial control systems typically monitor the system environment and control physical objects and devices, such as pipeline valves. Disruptions or failures can result in death or injury, property damage, and loss of critical services.

Due to these unique performance, reliability and safety requirements, securing industrial control systems often requires adaptations and extensions to the NIST-developed security standards and guidelines for IT systems only. The new guide describes these adaptations and extensions, provides an overview of various systems and their organizational layouts, describes typical threats and vulnerabilities, and recommends appropriate countermeasures.

“Securing an industrial control system requires a proactive, collaborative effort that engages cyber security experts, control engineers and operators and other experts and experienced workers,” said NIST mechanical engineer and lead author Keith Stouffer. “It also requires factoring in—and addressing—new risks introduced by the evolving ‘smart’ electric power grid.”

Stouffer recommends using the new guide along with Guidelines for Smart Grid Cyber Security (NISTIR 7628), which NIST issued last September, to tackle security issues arising from the convergence of the electric power Smart Grid and ICS.



Leave a Reply

You must be logged in to post a comment.