Published: 2010-08-22,
Last Updated: 2010-08-23 05:58:02 UTC
by Manuel Humberto Santander Pelaez (Version: 1)

One of the most interesting challenges of working as Chief Information
Security Officer in a utility company is the variety of infrastructure types
that supports the business process. I refer here to the infrastructure that
supports real-time management systems for generation transmission and
distribution of energy and the system that are responsible for coordinating
the pumping of water to individual households and industries.

The implementation of a information security management system that includes
this kind of critical infrastructure to the business processes provides a
number of interesting challenges which are not covered in the conventional
security model for IT processes:

   - Information Security risks associated to the delivery process of energy
   and water utility services process, can lead to disruption of both services
   for a large number of people in a country. If errors in the handling of
   SCADA equipment have been responsible of cascading effects that collapse
   most of the electrical system of a country, what if someone is doing an
   identity theft in the energy SCADA system and performs tasks such as
   increasing the rotation of the generation turbines, increasing the energy
   flow exceeding the capacity of a transmission line or simply turning off the
   turbines of a power plant? Imagine the chaos that would plunge a country or
   region.
   - What if in the water tanks of a city begins to overflow its maximum
   level and the pressure causes the pipes bursting in the streets? Imagine
   scenarios like the following in every city:
   http://www.youtube.com/watch?v=kbz_zxsJCfg&feature=related
   - The cost of repairing damage of any of the above scenarios is enormous.
   If we add the inability of the company to generate money for generation,
   transmission and distribution of energy, how much time passes before the
   company cease to exist?

SCADA systems have a very particular operating environment. Because they are
real-time systems, data monitoring and orders sent to the RTU should arrive
in the shortest time possible, since an additional delay of even 10 ms can
mean a massive blackout by activation of the protections of a substation.
Similarly, suppliers of these systems tend to provide support on these only
on a specific configuration, which is usually not too safe and lacks basic
security controls such as security patches, data encryption, authentication
and non default configurations.



For more information:

http://isc.sans.edu/diary.html?date=2010-08-22



Regards

Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to