By John Cusimano, Director, Exida Security Services Division
and
Eric Byres, CTO, Byres Security
The recent Stuxnet worm that targeted Siemens HMI and PLC systems (see Worst Fears Realized) highlights the fact that designing a good cyber defense for your SCADA or process control system is no longer an option. While the motivations of the worm's designers are still not clear, the undisputable fact is that this worm was designed to let an outsider gain unauthorized access to control systems using the most widely deployed brand of PLC and SCADA products in the world.
To their credit, Siemens and Microsoft responded rapidly to the Stuxnet threat, and provided a patch to address the vulnerability and a utility to detect and remove the virus. But everyone knows it's always better to prevent a threat than to react to one.
So, how can you protect yourself from the next Stuxnet?
The answer in a sense is relatively simple—develop and maintain a cyber security management program that employs a defense-in-depth strategy. Think of it this way: suppose you lived in a neighborhood that recently saw a large increase in the crime rate. Short of moving, what would you do to protect yourself , your family and your possessions?
The answer probably wouldn't be just one thing, such as patching the hole in the fence. You would probably implement a number of defenses, such as erecting a high fence around your property, installing a surveillance system, upgrading the locks on windows and doors, getting a watchdog, etc.
In addition, you might also implement some "policy" changes around the house: no more leaving the garage door open during the day, or the alarm must be armed whenever you leave the house, etc.
[pullquote]A cyber security program is the same thing. It's combines policies and procedures coupled with technical countermeasures and an ongoing program to monitor, maintain and adapt as necessary. Simply put, cyber security is a risk management issue, so the proper way to address it is with a risk management program. In the real world, there is no such thing as perfect security and no such thing as zero risk. However, a good risk management program will help you assess and mitigate the risk to levels you can live with, i.e. tolerable risk.
Fortunately, there is no shortage of guidance on how to do this. Over the last decade numerous organizations such as ACC, ANSI, API, AWWA, DHS, IEC, ISA, NERC, NIST and WIB, to name a few, have published a variety of standards and best practice documents addressing the subject of control system cyber security.
If you're going to read one standard, we recommend ISA99, specifically ANSI/ISA 99.02.01-2009. It is sector-independent, outlines most everything you need to know to establish a cyber security program at your facility and provides ample references to other sources of information. Of course, if you're in a regulated industry, such as power or chemical, you will also want to read the sector-specific regulatory standards, such as NERC CIP and DHS CFATS.