Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Assessing the U.S. power grid after Ukraine

Kenneth van Wyk | Feb. 10, 2016
Security in the U.S. power sector is taken very seriously. But of course security can always be tighter.

qatar power lines
Credit: Vincent van Zeijst, CC BY-SA 3.0, via Wikipedia

It finally happened. The power grid went down, affecting hundreds of thousands of people, and the cause was at least in part computer malware. Some people had been warning about this for years.

Maybe you didn’t hear about it. The outage occurred in Ukraine, after all. But even though the incident didn’t get a lot of attention here, it’s still significant. And now that I’ve called your attention to it, you might be wondering how this could have happened. Aren’t our power grids “air gapped” from the Internet? Well, not exactly.

When I say that, I’m talking about the U.S. I don’t know how things are done in Ukraine, but I have worked in the U.S. power sector and know something about the security policies and procedures here.

The good news is that the power grid systems I’ve seen are among the tightest, best-configured systems I’ve ever encountered. The networks are set up to allow communications between computers using protocols that are expressly required for their missions. Any communication or protocol that isn’t permitted in advance is dropped at the network access control level, and the security operators are alerted. I’m sure there are exceptions to this in the sector, but that kind of tight configuration is the norm in the systems I’ve seen.

What’s more, the back-end systems that actually connect to power systems are highly specialized devices that do not run general-purpose operating systems. These systems tend to be fail-safe, so if the computerized control were to fail, power would still be delivered to customers.

Access to these networks is as rigorously controlled as anything I’ve ever witnessed. Multifactor authentication and physical controls are normal. Security is taken very seriously in the U.S. power sector. Compared to general-purpose computing environments, these systems are simply rock solid.

Ah, but let’s not forget my favorite security motto: There ain’t a horse that can’t be rode, and there ain’t a man that can’t be throwed. And there are some practices within the power industry that are less than ideal.

The systems used in today’s smart grid environments, at least in the data centers, tend to run the same general-purpose operating systems you find elsewhere. They are subject to all the same “patch Tuesday” problems as any other general-purpose, commercial off-the-shelf systems. Many of these systems have removable media, so it’s feasible for malicious software to move from one security realm to another, even when the networks are configured to restrict such traffic. What’s more, because of the mission-critical nature of the systems, patch rollouts are usually meticulous and slow. That, of course, means the systems are exposed to known vulnerabilities longer than a laptop computer that automatically downloads and installs patches the moment they’re available.


1  2  Next Page 

Sign up for CIO Asia eNewsletters.