Maybe you didn’t hear about it. The outage occurred in Ukraine, after all. But even though the incident didn’t get a lot of attention here, it’s still significant. And now that I’ve called your attention to it, you might be wondering how this could have happened. Aren’t our power grids “air gapped” from the Internet? Well, not exactly.
When I say that, I’m talking about the U.S. I don’t know how things are done in Ukraine, but I have worked in the U.S. power sector and know something about the security policies and procedures here.
The good news is that the power grid systems I’ve seen are among the tightest, best-configured systems I’ve ever encountered. The networks are set up to allow communications between computers using protocols that are expressly required for their missions. Any communication or protocol that isn’t permitted in advance is dropped at the network access control level, and the security operators are alerted. I’m sure there are exceptions to this in the sector, but that kind of tight configuration is the norm in the systems I’ve seen.
What’s more, the back-end systems that actually connect to power systems are highly specialized devices that do not run general-purpose operating systems. These systems tend to be fail-safe, so if the computerized control were to fail, power would still be delivered to customers.
Access to these networks is as rigorously controlled as anything I’ve ever witnessed. Multifactor authentication and physical controls are normal. Security is taken very seriously in the U.S. power sector. Compared to general-purpose computing environments, these systems are simply rock solid.
Ah, but let’s not forget my favorite security motto: There ain’t a horse that can’t be rode, and there ain’t a man that can’t be throwed. And there are some practices within the power industry that are less than ideal.
The systems used in today’s smart grid environments, at least in the data centers, tend to run the same general-purpose operating systems you find elsewhere. They are subject to all the same “patch Tuesday” problems as any other general-purpose, commercial off-the-shelf systems. Many of these systems have removable media, so it’s feasible for malicious software to move from one security realm to another, even when the networks are configured to restrict such traffic. What’s more, because of the mission-critical nature of the systems, patch rollouts are usually meticulous and slow. That, of course, means the systems are exposed to known vulnerabilities longer than a laptop computer that automatically downloads and installs patches the moment they’re available.
So I’m not surprised that a power grid could be impacted by malware. It’s disappointing, but it’s going to happen, and this certainly won’t be the last time.
Most analysts talk about the need for industrial control systems (ICS) operators to keep the bad guys out. Fair enough, but don’t for a minute think those ICS folk will be perfectly successful. Power suppliers’ ICS teams need to be prepared for failures and have in place industrial-strength incident response planning and preparation. I’ve seen some that do this very well, but the ICS world is quite new to incident response (at least, of the computer security variety). There is still plenty of work to be done, but at least ICS operators know, all too well, that they have to plan and drill for emergencies.
With more than 20 years in the information security field, Kenneth van Wyk has worked at Carnegie Mellon University's CERT/CC, the U.S. Deptartment of Defense, Para-Protect and others. He has published two books on information security and is working on a third. He is the president and principal consultant at KRvW Associates LLC in Alexandria, Va.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.