CISCO Executive Briefing Sessions on ICS Security

Jan. 29, 2010

Tuesday to Thursday, I presented a control system cyber security discussion for CISCO’s Executive Collaboration Roundtable (ECRT). The sessions were for electric utilities and addressed NERC CIP, Smart Grid, NRC cyber security, and most importantly engineering prudency. More than 40 attendees from approximately 32 utilities attended via TelePresence and WebEx. Most were from IT. There were some common assumptions and themes:

Tuesday to Thursday, I presented a control system cyber security discussion for CISCO’s Executive Collaboration Roundtable (ECRT). The sessions were for electric utilities and addressed NERC CIP, Smart Grid, NRC cyber security, and most importantly engineering prudency. More than 40 attendees from approximately 32 utilities attended via TelePresence and WebEx. Most were from IT. There were some common assumptions and themes:
- It is not possible to fully secure control systems. This surprised many of the IT attendees. The intent is to put a “club” on them to make them more secure than they are now. There are currently no best practices for trade-offs between performance/safety and security.
- Silos still exist between IT and operations. There were discussions about this topic each day – we are getting better but have a long way to go. It should also be noted that Operations is not homogeneous either. The silos make it difficult to adequately address control system cyber security.
- Employing inappropriate IT policies and tools, such as scanning, can affect control systems. One utility mentioned they tried scanning a control system network in a power plant. This impacted the plant and IT was “not invited back”. In this case, the plant was down for an outage so it did not shut the plant down, but it did shut the DCS down for several hours.
- Particularly for NERC CIP compliance, many IT participants felt they had “air gapped” the control networks from Corporate and elsewhere. After further discussions in each session, it became more evident they had not fully isolated their control systems.
- Control system vendor products surprised many of the IT attendees. By simply googling control system vendor products, the websites showed they were using Bluetooth, had internal modems in their devices, etc. 
- The most fundamental and important issue with all three sessions was the aim – almost all were concerned about NERC CIP which is a compliance exercise- many were not reacting to the fundamental reason for cyber security is to protect the reliability of their hundreds of millions of dollars worth of operational assets.

All in all, they were very good sessions, with the “lights going on” as each session progressed.

Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...