Critical Infrastructure Protection

Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Gao ID: GAO-07-1036 September 10, 2007

Control systems--computer-based systems that monitor and control sensitive processes and physical functions--perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of control systems could have a significant impact on public health and safety, which makes securing them a national priority. GAO was asked to (1) determine cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems; (2) determine the challenges to securing these systems; (3) identify private sector initiatives to strengthen the cybersecurity of control systems; and (4) assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems. To address these objectives, we met with federal and private sector officials to identify risks, initiatives, and challenges. We also compared agency plans to best practices for securing critical infrastructures.

Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or nontargeted, and can come from a variety of sources. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet. Further, as demonstrated by past attacks and incidents involving control systems, the impact on a critical infrastructure could be substantial. For example, in 2003, a computer virus was blamed for shutting down train signaling systems throughout the East Coast and in 2006, a foreign hacker was reported to have planted malicious software capable of affecting a water filtering plant's treatment operations. Critical infrastructure owners face both technical and organizational challenges to securing control systems. Technical challenges--including control systems' limited processing capabilities, real-time operations, and design constraints--hinder an infrastructure owner's ability to implement traditional information technology security processes, such as strong user authentication and patch management. Organizational challenges include difficulty in developing a compelling business case for investing in control systems security and differing priorities of information security personnel and control systems engineers. Multiple private sector entities such as trade associations and standards setting organizations are working to help secure control systems. Their efforts include developing standards, providing guidance to members, and hosting workshops on control systems security. For example, the electricity industry has recently developed standards for cybersecurity of control systems and a gas trade association is developing guidance for members to use encryption to secure control systems. Federal agencies also have multiple initiatives under way to help secure critical infrastructure control systems, but more remains to be done to coordinate these efforts and to address specific shortfalls. Over the past few years, federal agencies--including the Department of Homeland Security, the Department of Energy, and the Federal Energy Regulatory Commission (FERC)--have initiated efforts to improve the security of critical infrastructure control systems. However, there is as yet no overall strategy to coordinate the various activities across federal agencies and the private sector. Further, DHS lacks processes needed to address specific weaknesses in sharing information on control system vulnerabilities. Until public and private sector security efforts are coordinated by an overarching strategy and specific information sharing shortfalls are addressed, there is an increased risk that multiple organizations will conduct duplicative work and miss opportunities to fulfill their critical missions.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-07-1036, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain This is the accessible text file for GAO report number GAO-07-1036 entitled 'Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain' which was released on October 17, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Report to Congressional Requesters: September 2007: Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain: GAO-07-1036: GAO Highlights: Highlights of GAO-07-1036, a report to congressional requesters. Why GAO Did This Study: Control systems”computer-based systems that monitor and control sensitive processes and physical functions”perform vital functions in many of our nation‘s critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of control systems could have a significant impact on public health and safety, which makes securing them a national priority. GAO was asked to (1) determine cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems; (2) determine the challenges to securing these systems; (3) identify private sector initiatives to strengthen the cybersecurity of control systems; and (4) assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems. To address these objectives, we met with federal and private sector officials to identify risks, initiatives, and challenges. We also compared agency plans to best practices for securing critical infrastructures. What GAO Found: Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or nontargeted, and can come from a variety of sources. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet. Further, as demonstrated by past attacks and incidents involving control systems, the impact on a critical infrastructure could be substantial. For example, in 2003, a computer virus was blamed for shutting down train signaling systems throughout the East Coast and in 2006, a foreign hacker was reported to have planted malicious software capable of affecting a water filtering plant‘s treatment operations. Critical infrastructure owners face both technical and organizational challenges to securing control systems. Technical challenges”including control systems‘ limited processing capabilities, real-time operations, and design constraints”hinder an infrastructure owner‘s ability to implement traditional information technology security processes, such as strong user authentication and patch management. Organizational challenges include difficulty in developing a compelling business case for investing in control systems security and differing priorities of information security personnel and control systems engineers. Multiple private sector entities such as trade associations and standards setting organizations are working to help secure control systems. Their efforts include developing standards, providing guidance to members, and hosting workshops on control systems security. For example, the electricity industry has recently developed standards for cybersecurity of control systems and a gas trade association is developing guidance for members to use encryption to secure control systems. Federal agencies also have multiple initiatives under way to help secure critical infrastructure control systems, but more remains to be done to coordinate these efforts and to address specific shortfalls. Over the past few years, federal agencies”including the Department of Homeland Security, the Department of Energy, and the Federal Energy Regulatory Commission (FERC)”have initiated efforts to improve the security of critical infrastructure control systems. However, there is as yet no overall strategy to coordinate the various activities across federal agencies and the private sector. Further, DHS lacks processes needed to address specific weaknesses in sharing information on control system vulnerabilities. Until public and private sector security efforts are coordinated by an overarching strategy and specific information sharing shortfalls are addressed, there is an increased risk that multiple organizations will conduct duplicative work and miss opportunities to fulfill their critical missions. What GAO Recommends: GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO‘s recommendations, but stated that they would take them under advisement. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Dave Powner at (202) 512- 9286 or at pownerd@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Critical Infrastructure Control Systems Face Increasing Risks Due to Cyber Threats, Vulnerabilities, and the Potentially Serious Impact of an Attack: Critical Infrastructure Owners Face Technical and Organizational Challenges to Securing Control Systems: The Private Sector Has Multiple Initiatives Under Way to Help Secure Control Systems: Federal Agencies Have Multiple Initiatives to Help Secure Critical Infrastructure Control Systems, but More Remains to Be Done: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: The Department of Homeland Security's Control Systems Security Initiatives: Appendix III: The Department of Energy's Initiatives to Support Control Systems Security within the Energy Sector: Appendix IV: Other Agencies' Initiatives to Help Secure Critical Infrastructure Control Systems: Appendix V: GAO Contacts and Staff Acknowledgments: Tables: Table 1: Critical Infrastructure Sectors and Designated Sector-Specific Agencies: Table 2: Sources of Cyber Threats to Critical Infrastructures: Table 3: Comparing IT Systems to Control Systems Illustrates Security Challenges: Table 4: Key Control System Security Initiatives in the Electricity Sector: Table 5: Key Control System Security Initiatives in the Oil and Gas Sector: Table 6: Key Control System Security Initiatives in the Water Sector: Table 7: Control System Security Initiatives that Affect Multiple Sectors: Table 8: Selected DHS Control Systems Security Initiatives: Table 9: NIST Control Systems Security Efforts: Figures: Figure 1: Examples of Critical Infrastructures (clockwise from upper left: chemical plants, nuclear power plants, hydroelectric dams, and railroads): Figure 2: Control Room of an Electric Power Company: Figure 3: Major Components of a SCADA System: Figure 4: Components of a Control System in a Water Treatment and Distribution Facility: Figure 5: A Substation That Is Part of Idaho National Laboratory's Facilities for Testing Control Systems: Figure 6: The Pacific Northwest National Laboratory's Electricity Infrastructure Operations Center: Abbreviations: CIP: critical infrastructure protection: DHS: Department of Homeland Security: DOE: Department of Energy: FERC: Federal Energy Regulatory Commission: IT: information technology: NERC: North American Electric Reliability Corporation: NIST: National Institute of Standards and Technology: SCADA: supervisory control and data acquisition: US-CERT: United States Computer Emergency Readiness Team: [End of section] United States Government Accountability Office: Washington, DC 20548: September 10, 2007: Congressional Requesters: Control systems are computer-based systems that are used in many industries to monitor and control sensitive processes and physical functions. Control systems perform vital functions in many of our nation's critical infrastructures, including electric power generation, transmission, and distribution; oil and gas refining and pipelines; water treatment and distribution; chemical production and processing; railroads and mass transit; and manufacturing. Ten years ago, the President's Commission on Critical Infrastructure Protection highlighted the risk of cyber attacks on critical infrastructures, stating that "the widespread and increasing use of supervisory control and data acquisition systems for control of energy systems provides increasing ability to cause serious damage and disruption by cyber means." In 2003, the National Strategy to Secure Cyberspace[Footnote 1] (often called the cyberspace strategy) stated that the disruption of control systems could have significant consequences for public health and safety, and made securing these systems a national priority. The cyberspace strategy further states that both the private and public sectors have roles in securing control systems. The strategy directs the Department of Homeland Security (DHS), in coordination with the Department of Energy (DOE) and other agencies, to work in partnership with private industry in increasing awareness of the importance of efforts to secure control systems, developing standards, and improving policies with respect to control systems security. Given the importance of this issue, you asked us to (1) determine cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems; (2) determine the challenges to securing critical infrastructure control systems; (3) identify private sector initiatives to strengthen the cybersecurity of control systems; and (4) assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems. To accomplish these objectives, we assessed documentation of control system security incidents and analyzed research studies and reports, as well as our prior reports and testimonies on control systems, critical infrastructure protection (CIP), and national preparedness, among others. We analyzed reports by, and met with, private sector and federal officials who had expertise in control systems and their security. Our work was performed from March 2007 to July 2007 in accordance with generally accepted government auditing standards. Appendix I contains further details on our objectives, scope, and methodology. Results in Brief: Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or nontargeted, and can come from a variety of sources including foreign governments, criminal groups, and disgruntled organization insiders. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet. Further, as demonstrated by past attacks and incidents involving control systems, the impact on a critical infrastructure could be substantial. For example, in 2003, a computer virus was blamed for shutting down train signaling systems throughout the East Coast; in 2006, a foreign hacker was reported to have planted malicious software capable of affecting a water filtering plant's water treatment operations; and, also in 2006, excessive traffic on a nuclear power plant's control system network--possibly caused by the failure of another control system device--caused two circulation pumps to fail, forcing the unit to be shut down manually. Critical infrastructure owners face both technical and organizational challenges to securing control systems. Technical challenges-- including control systems' limited processing capabilities, real-time operations, and design constraints--hinder an infrastructure owner's ability to implement traditional information technology (IT) security processes, such as strong user authentication and patch management. Organizational challenges include difficulty in developing a compelling business case for investing in control systems security and differing priorities of information security personnel and control systems engineers. Multiple private sector entities such as trade associations and standards setting organizations are working to help secure control systems. These organizations include those specific to the electric, chemical, oil and gas, and water sectors. Their efforts include developing standards, providing guidance to members, and hosting workshops on control systems security. For example, the electricity industry has recently developed standards for cybersecurity of control systems, and a gas trade association is developing guidance for members to use encryption to secure control systems. Over the past few years, federal agencies--including DHS, DOE, the National Institute of Standards and Technology (NIST), the Federal Energy Regulatory Commission (FERC), and others--have initiated efforts to improve the security of critical infrastructure control systems. However, there is as yet no overall strategy to coordinate the various control systems activities across federal agencies and the private sector. Further, DHS lacks processes needed to address specific weaknesses in sharing information on control system vulnerabilities. Until public and private sector security efforts are coordinated by an overarching strategy, there is an increased risk that multiple organizations will conduct duplicative work and miss opportunities to learn from other organizations' activities. In addition, until information-sharing weaknesses are addressed, DHS risks not being able to effectively carry out its responsibility for sharing information on vulnerabilities with the private and public sectors. We are making recommendations to the Secretary of the Department of Homeland Security to develop a strategy for coordinating control systems security efforts and to enhance information sharing with control systems stakeholders. DHS officials, including the Deputy Director of the National Cyber Security Division, provided comments via e-mail on a draft of this report, but did not agree or disagree with our recommendations. Instead, agency officials stated that the agency would take the recommendations under advisement. DHS officials also discussed the agency's plans to develop a comprehensive strategy for control systems security and efforts to develop a process for sharing sensitive information on control system vulnerabilities. In addition, DHS officials and others who contributed information to this report provided technical comments, which we have incorporated in this report as appropriate. Background: Critical infrastructures are physical or virtual systems and assets so vital to the nation that their incapacitation or destruction would have a debilitating impact on national and economic security, public health, and safety. These systems and assets--such as the electric power grid, chemical plants, and water treatment facilities--are essential to the operations of the economy and the government. Recent terrorist attacks and threats have underscored the need to protect our nation's critical infrastructures. If vulnerabilities in these infrastructures are exploited, our nation's critical infrastructures could be disrupted or disabled, possibly causing loss of life, physical damage, and economic losses. Although the vast majority of our nation's critical infrastructures are owned by the private sector, the federal government owns and operates key facilities that use control systems, including oil, gas, water, energy, and nuclear facilities (see fig. 1). Figure 1: Examples of Critical Infrastructures (clockwise from upper left: chemical plants, nuclear power plants, hydroelectric dams, and railroads) (photographs): [See PDF for image] Sources (clockwise from upper left): Corbis, PhotoDisc, Corbis, Digital Vision. [End of figure] Control Systems Are Used in Many Critical Infrastructures: Control systems are computer-based systems that are used within many infrastructures and industries to monitor and control sensitive processes and physical functions. Typically, control systems collect sensor measurements and operational data from the field, process and display this information, and relay control commands to local or remote equipment. Control systems perform functions that range from simple to complex. They can be used to simply monitor processes--for example, the environmental conditions in a small office building--or to manage the complex activities of a municipal water system or a nuclear power plant. In the electric power industry, control systems can be used to manage and control the generation, transmission, and distribution of electric power (see fig. 2). For example, control systems can open and close circuit breakers and set thresholds for preventive shutdowns. The oil and gas industry uses integrated control systems to manage refining operations at plant sites, remotely monitor the pressure and flow of gas pipelines, and control the flow and pathways of gas transmission. Water utilities can remotely monitor well levels and control the wells' pumps; monitor flows, tank levels, or pressure in storage tanks; monitor water quality characteristics such as pH, turbidity, and chlorine residual; and control the addition of chemicals to the water. Control systems are also used in manufacturing and chemical processing. Chemical reactors may use control systems to produce chemicals or regulate temperatures within the production process. Figure 2: Control Room of an Electric Power Company (photograph): [See PDF for image] Source: Major electric utility. [End of figure] Installing and maintaining control systems requires a substantial financial investment. DOE cites research estimating the value of the control systems used to monitor and control the electric grid and the oil and natural gas infrastructure at $3 billion to $4 billion.[Footnote 2] The thousands of remote field devices represent an additional investment of $1.5 billion to $2.5 billion. Each year, the energy sector alone spends over $200 million for control systems, networks, equipment, and related components and at least that amount in personnel costs. Control Systems: Types and Components: There are two primary types of control systems: distributed control systems and supervisory control and data acquisition (SCADA) systems. Distributed control systems typically are used within a single processing or generating plant or over a small geographic area, while SCADA systems typically are used for large, geographically dispersed operations. For example, a utility company may use a distributed control system to manage power generation and a SCADA system to manage its distribution. A SCADA system is generally composed of six components: instruments, operating equipment, local processors, short-range communication, host computers, and long-range communications. * Instruments sense conditions such as pH, temperature, pressure, power level, and flow rate. * Operating equipment includes pumps, valves, conveyors, and substation breakers that can be controlled by energizing actuators or relays. * Local processors communicate with the site's instruments and operating equipment. Local processors go by several different names, including programmable logic controller, remote terminal unit, intelligent electronic device, and process automation controller. A single local processor may be responsible for dozens of inputs from instruments and outputs to operating equipment. Local processors can collect instrument data; turn on and off operating equipment; translate protocols so different controllers, instruments, and equipment can communicate; and identify alarm conditions. * Short-range communication consists of the relatively short cables or wireless connections that carry analog and discrete signals between the local processors and the instruments and operating equipment. The communication uses electrical characteristics such as voltage and current or other established industrial communications protocols. * Host computers are the central point of monitoring and control. The host computer is where a human operator can supervise the process, receive alarms, review data, and exercise control. In some cases the host computer has logic programmed into it to provide control over the local processors. The host computer may be called the master terminal unit, the SCADA server, or a personal computer. * Long-range communication consists of the communication between the local processors and host computers. This communication typically covers miles using methods such as leased phone lines, satellite, microwave, and cellular packet data. Figure 3 illustrates the major components of a SCADA system and Figure 4 illustrates how these components would be distributed in a typical water utility. Figure 3: Major Components of a SCADA System: This is an illustration of the major components of a SCADA system: * Host computers; * Long-range communication; * Local processors; * Short-range communication; * Instruments; * Operating equipment. Source: GAO. [End of figure] These components can be adapted to perform specific functions in many industrial sectors. For example, the following graphic shows the application of these components in a water treatment and distribution system. Figure 4: Components of a Control System in a Water Treatment and Distribution Facility: [See PDF for image] This is an illustration of the components of a control system in a water treatment and distribution facility: * Reservoir; * Central control station; - Host computers; - Long-range communication; - Internet; * Water treatment plant; -Short-range communication; * Pumping station; - Operating equipment; - Instruments; - Local processors; * End use. Source: GAO. [End of figure] The Federal Government Plays a Critical Role in Helping Secure Critical Infrastructures and Their Control Systems: Federal law and policies call for critical infrastructure protection activities to enhance the cyber and physical security of both public and private infrastructures that are essential to national security, national economic security, and national public health and safety.[Footnote 3] Federal policy designates certain federal agencies as lead points of contact for each key critical infrastructure sector (see table 1). Further, it assigns agencies responsibility for infrastructure protection activities in their assigned sectors and for coordination with other relevant federal agencies, state and local governments, and the private sector. In addition, federal policy establishes DHS as the focal point for the security of cyberspace-- including analysis, warning, information sharing, vulnerability reduction, mitigation, and recovery efforts for public and private critical infrastructure information systems. To accomplish this mission, DHS is to work with other federal agencies, state and local governments, and the private sector. Table 1: Critical Infrastructure Sectors and Designated Sector-Specific Agencies: Sector: Agriculture and food; Sector-specific agency: Department of Agriculture, Department of Health and Human Services, Food and Drug Administration[A]. Sector: Banking and finance; Sector-specific agency: Department of the Treasury. Sector: Chemical; Sector-specific agency: Department of Homeland Security. Sector: Commercial facilities; Sector-specific agency: Department of Homeland Security. Sector: Commercial nuclear reactors, materials, and waste; Sector-specific agency: Department of Homeland Security. Sector: Dams; Sector-specific agency: Department of Homeland Security. Sector: Defense industrial base; Sector-specific agency: Department of Defense. Sector: Drinking water and water treatment systems; Sector-specific agency: Environmental Protection Agency. Sector: Emergency services; Sector-specific agency: Department of Homeland Security. Sector: Energy; Sector-specific agency: Department of Energy. Sector: Government facilities; Sector-specific agency: Department of Homeland Security. Sector: Information technology; Sector-specific agency: Department of Homeland Security. Sector: National monuments and icons; Sector-specific agency: Department of the Interior. Sector: Postal and shipping; Sector-specific agency: Department of Homeland Security. Sector: Public health and health care; Sector-specific agency: Department of Health and Human Services. Sector: Telecommunications; Sector-specific agency: Department of Homeland Security. Sector: Transportation systems; Sector-specific agency: Department of Homeland Security. Source: The National Infrastructure Protection Plan, Homeland Security Presidential Directive 7, and the National Strategy for Homeland Security. [A] The Department of Agriculture is responsible for food (including meat, poultry, and eggs) and agriculture; and the Department of Health and Human Services, Food and Drug Administration, is responsible for food other than meat, poultry, and egg products. [End of table] Several key federal plans focus on securing critical infrastructure control systems. The cyberspace strategy [Footnote 4] calls for DHS and DOE to work in partnership with industry to develop best practices and new technology to increase the security of critical infrastructure control systems, to determine the most critical control systems-related sites, and to develop a prioritized plan for short-term cybersecurity improvements for those sites. In addition, DHS's National Infrastructure Protection Plan[Footnote 5] specifically identifies control systems as part of the cyber infrastructure, establishes an objective of reducing vulnerabilities and minimizing severity of attacks on these systems, and identifies programs directed at protecting control systems. Further, in May 2007, the critical infrastructure sectors issued sector-specific plans to supplement the National Infrastructure Protection Plan. Twelve sectors, including the chemical, energy, water, information technology, postal, emergency services, and telecommunications sectors, identified control systems within their respective sectors. Of these, most identified control systems as critical to their sector and listed efforts under way to help secure them. Critical Infrastructure Control Systems Face Increasing Risks Due to Cyber Threats, Vulnerabilities, and the Potentially Serious Impact of an Attack: Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the potentially serious impact of an attack as demonstrated by reported incidents. Cyber threats can be unintentional or intentional, targeted or nontargeted, and can come from a foreign, domestic, or inside source. Control systems can have vulnerabilities that make them susceptible to cyber attacks, including the increased connectivity of control systems to other systems and the Internet. Further, based on past events, the impact of a control systems incident on a critical infrastructure could be substantial. Critical Infrastructures Face Multiple Cyber Threats: Cyber threats can be unintentional and intentional, targeted or nontargeted, and can come from a variety of sources. Unintentional threats can be caused by software upgrades or maintenance procedures that inadvertently disrupt systems. Intentional threats include both targeted and nontargeted attacks. A targeted attack is when a group or individual specifically attacks a critical infrastructure system. A nontargeted attack occurs when the intended target of the attack is uncertain, such as when a virus, worm, or malware[Footnote 6] is released on the Internet with no specific target. There is increasing concern among both government officials and industry experts regarding the potential for a cyber attack on a national critical infrastructure, including the infrastructure's control systems. The Federal Bureau of Investigation has identified multiple sources of threats to our nation's critical infrastructures, including foreign nation states engaged in information warfare, domestic criminals and hackers, and disgruntled employees working within an organization. Table 2 summarizes those groups or individuals that are considered to be key sources of threats to our nation's infrastructures. Table 2: Sources of Cyber Threats to Critical Infrastructures: Threat source: Criminal groups; Description: There is an increased use of cyber intrusions by criminal groups that attack systems for monetary gain. Threat source: Foreign nation states; Description: Foreign intelligence services use cyber tools as part of their information gathering and espionage activities. Also, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power--impacts that, according to the Director of the Central Intelligence Agency, can affect the daily lives of Americans across the country.[A]. Threat source: Hackers; Description: Hackers sometimes crack into networks for the thrill of the challenge or for bragging rights in the hacker community. While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus, attack tools have become more sophisticated and easier to use. Threat source: Hacktivists; Description: Hacktivism refers to politically motivated attacks on publicly accessible Web pages or e-mail servers. These groups and individuals overload e-mail servers and hack into Web sites to send a political message. Threat source: Disgruntled insiders; Description: The disgruntled insider, working from within an organization, is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a victim system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes contractor personnel. Threat source: Terrorists; Description: Terrorists seek to destroy, incapacitate, or exploit critical infrastructures to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. However, traditional terrorist adversaries of the United States are less developed in their computer network capabilities than other adversaries. Terrorists likely pose a limited cyber threat. The Central Intelligence Agency believes terrorists will stay focused on traditional attack methods, but it anticipates growing cyber threats as a more technically competent generation enters the ranks. Threat source: Virus writers; Description: Virus writers are posing an increasingly serious threat. Several destructive computer viruses and worms have harmed files and hard drives, including the Melissa macro virus, the Explore.Zip worm, the CIH (Chernobyl) virus, Nimda, and Code Red. Source: Federal Bureau of Investigation, unless otherwise indicated. [A] Prepared statement of George J. Tenet, Director of Central Intelligence, before the Senate Select Committee on Intelligence, February 2, 2000. [End of table] Control Systems Are Vulnerable to Cyber Attacks: Control systems are vulnerable to flaws or weaknesses in system security procedures, design, implementation, and internal controls. When these weaknesses are accidentally triggered or intentionally exploited, they could result in a security breach. Vulnerabilities could occur in control systems' policies, platform (including hardware, operating systems, and control system applications), or networks. Federal and industry experts believe that critical infrastructure control systems are more vulnerable today than in the past. Reasons include the increased standardization of technologies, the increased connectivity of control systems to other computer networks and the Internet, insecure connections, and the widespread availability of technical information about control systems. Further, it is not uncommon for control systems to be configured with remote access through either a dial-up modem or over the Internet to allow remote maintenance or around-the-clock monitoring. If control systems are not properly secured, individuals and organizations may eavesdrop on or interfere with these operations from remote locations. Reported Control Systems Incidents Reveal the Potential for Substantial Impact: Reported attacks and unintentional incidents involving critical infrastructure control systems demonstrate that a serious attack could be devastating. Although there is not a comprehensive source for incident reporting, the following attacks, reported in government and media sources,[Footnote 7] demonstrate the potential impact of an attack. * Worcester air traffic communications. In March 1997, a teenager in Worcester, Massachusetts, disabled part of the telephone network using a dial-up modem connected to the system. This disabled phone service to the airport control tower, airport security, the airport fire department, the weather service, and the carriers that use the airport. Also, the tower's main radio transmitter and another transmitter that activates runway lights were shut down, as well as a printer that controllers use to monitor flight progress. The attack also disrupted phone service to 600 homes in a nearby town. * Maroochy Shire sewage spill. In the spring of 2000, a former employee of an Australian organization that develops manufacturing software applied for a job with the local government, but was rejected. Over a 2- month period, this individual reportedly used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for particular sewerage pumping stations and caused malfunctions in their operations, ultimately releasing about 264,000 gallons of raw sewage into nearby rivers and parks. * Los Angeles traffic lights. According to several published reports, in August 2006, two Los Angeles city employees hacked into computers controlling the city's traffic lights and disrupted signal lights at four intersections, causing substantial backups and delays. The attacks were launched prior to an anticipated labor protest by the employees. In addition, the following incidents illustrate the consequences of nontargeted attacks and unintentional incidents on critical infrastructure control systems. According to experts, incidents such as these could also be triggered by a targeted attack. * CSX train signaling system. In August 2003, the Sobig computer virus was blamed for shutting down train signaling systems throughout the East Coast of the United States. The virus infected the computer system at CSX Corporation's Jacksonville, Florida, headquarters, shutting down signaling, dispatching, and other systems. According to an Amtrak spokesman, 10 Amtrak trains were affected. Train service was either shut down or delayed up to 6 hours. * Davis-Besse power plant. The Nuclear Regulatory Commission confirmed that in January 2003, the Microsoft SQL Server worm known as Slammer infected a private computer network at the idled Davis-Besse nuclear power plant in Oak Harbor, Ohio, disabling a safety monitoring system for nearly 5 hours. In addition, the plant's process computer failed, and it took about 6 hours for it to become available again. * Northeast power blackout. In August 2003, failure of the alarm processor in the control system of FirstEnergy, an Ohio-based electric utility, prevented control room operators from having adequate situational awareness of critical operational changes to the electrical grid. This problem was compounded when the state estimating program at the Midwest Independent System Operator failed due to incomplete information on the electric grid. When several key transmission lines in northern Ohio tripped due to contact with trees, they initiated a cascading failure of 508 generating units at 265 power plants across eight states and a Canadian province. * Zotob worm. In August 2005, a round of Internet worm infections knocked 13 of Daimler Chrysler's U.S. automobile manufacturing plants offline for almost an hour, leaving workers idle as infected Microsoft Windows systems were patched. Zotob and its variations also caused computer outages at heavy-equipment maker Caterpillar Inc., aircraft maker Boeing, and several large U.S. news organizations. * Taum Sauk Water Storage Dam failure. In December 2005, the Taum Sauk Water Storage Dam, approximately 100 miles south of St. Louis, Missouri, suffered a catastrophic failure, releasing a billion gallons of water. According to the dam's operator, the incident may have occurred because the gauges at the dam read differently than the gauges at the dam's remote monitoring station. * Bellingham, Washington, gasoline pipeline failure. In June 1999, 237,000 gallons of gasoline leaked from a 16-inch pipeline and ignited an hour and a half later, causing three deaths, eight injuries, and extensive property damage. The pipeline failure was exacerbated by poorly performing control systems that limited the ability of the pipeline controllers to see and react to the situation. * Harrisburg, Pennsylvania, water system. In October 2006, a foreign hacker penetrated security at a water filtering plant. The intruder planted malicious software that was capable of affecting the plant's water treatment operations. The infection occurred through the Internet and did not seem to be an attack that directly targeted the control system. * Browns Ferry power plant. In August 2006, two circulation pumps at Unit 3 of the Browns Ferry, Alabama, nuclear power plant failed, forcing the unit to be shut down manually. The failure of the pumps was traced to excessive traffic on the control system network, possibly caused by the failure of another control system device. As control systems become increasingly interconnected with other networks and the Internet, and as the system capabilities continue to increase, so do the threats, potential vulnerabilities, types of attacks, and consequences of compromising these critical systems. Critical Infrastructure Owners Face Technical and Organizational Challenges to Securing Control Systems: Critical infrastructure owners face both technical and organizational challenges in securing their control systems. Technical challenges-- including control systems' limited processing capabilities and their real-time operations--hinder infrastructure owners' ability to implement traditional information security technologies and practices. Organizational challenges include the lack of a compelling business case to improve security and a reluctance to share information regarding incidents. Technical Challenges Hinder Use of Traditional Information Security Measures for Control Systems: According to industry experts, existing information security technologies and practices--such as strong user authentication and patch management--are generally not implemented in control systems due to several technical issues, including limited computational processing capabilities, the need for real-time operation, and the lack of consideration of cybersecurity in the original design of the system. These challenges are described here in more detail. Limited computational capabilities. Existing security technologies-- such as authorization, authentication, encryption, intrusion detection, and filtering of network traffic and communications--require more bandwidth, processing power, and memory than control system components typically have. Controller stations are generally designed to do specific tasks, and they often use low-cost, resource-constrained microprocessors. In addition, passwords and other data from control systems are often transmitted in a plain, unencrypted format. Encrypting this data could overload the processing abilities of the control system. Need for real-time operations. Complex passwords and other strong password practices are not always used to prevent unauthorized access to control systems, in part because they could hinder the operator's ability to respond rapidly during an emergency. As a result, according to security experts, weak passwords that are easy to guess, and shared and infrequently changed, are common in control systems. Some even use default passwords or no password at all. Design limitations. Historically, control systems vendors did not design their products with security in mind, although recently vendors have begun including more security-related features in their products. In addition, although modern control systems are based on standard operating systems, they are typically customized to support control system applications. Consequently, software patches may either be incompatible with the customized version of the operating system or difficult to implement without compromising service by shutting down "always-on" systems or affecting interdependent operations. Table 3 illustrates the technical challenges in securing control systems by contrasting them with conventional information technology (IT) systems. Table 3: Comparing IT Systems to Control Systems Illustrates Security Challenges: System characteristic: Performance requirements; Information technology system: * Generally not real time; * Response must be consistent; * High throughput is demanded; * Delay may be acceptable; Control system: * Real time; * Response is time critical; * Modest throughput is acceptable; * Delay is a serious concern; Security challenge for control systems: Real-time operations: The security solution should not delay system response time. System characteristic: Availability requirements; Information technology system: * Responses such as rebooting are acceptable; * Availability deficiencies can often be tolerated, depending on the system's operational requirements; Control system: * Responses such as rebooting may not be acceptable because of process availability requirements; * Outages must be planned and scheduled days/weeks in advance; * High availability requires exhaustive predeployment testing; Security challenge for control systems: Design limitations: The security solution should not require rebooting or cause unplanned outages. System characteristic: Risk management requirements; Information technology system: * Data confidentiality and integrity are paramount; * Fault tolerance is less important-momentary downtime is not a major risk; * Major risk impact is delay of business operations; Control system: * Human safety is paramount, followed by protection of the process; * Fault tolerance is essential: even momentary downtime is not acceptable; * Major risk impact is regulatory noncompliance or loss of life, equipment, or production; Security challenge for control systems: Design limitations: The security solution should not impose unacceptable risk by endangering lives or affecting the process being controlled; the security solution should not cause downtime. System characteristic: Time-critical interaction; Information technology system: * Less critical emergency interaction; * Tightly restricted access control can be implemented to the degree necessary; Control system: * Response to human and other emergency interaction is critical; * Access to control system should be strictly controlled, yet not hamper human-machine interaction; Security challenge for control systems: Real-time operations: Increased security of stringent access controls must be balanced against the need for fast response times in emergencies. System characteristic: System operation; Information technology system: * Systems are designed for use with typical operating systems; * Upgrades are straightforward with the availability of automated deployment tools; Control system: * Differing and custom operating systems often do not have security capabilities; * Software changes must be carefully made, usually by software vendors, because of the specialized control algorithms and perhaps modified hardware and software involved; Security challenge for control systems: Design limitation: Additional testing and modification of off-the-shelf products may be required; additional time may be required for vendors to implement upgrades. System characteristic: Resource constraints; Information technology system: * Systems are specified with enough resources to support the addition of third party applications such as security solutions; Control system: * Systems are designed to support the intended industrial process, with minimal memory and computing resources to support the addition of security technology; Security challenge for control systems: Processing capabilities: It is more difficult to add additional security technology or processes to control systems. System characteristic: Communications; Information technology system: * Standard communications protocols; * Primarily wired networks with some localized wireless capabilities; * Typical IT networking practices; Control system: * Many proprietary and standard communication protocols; * Several types of communications media used including dedicated wire and wireless (radio and satellite); * Networks are complex and sometimes require the expertise of control engineers; Security challenge for control systems: Design limitation: Standard IT solutions may not operate on control system networks. System characteristic: Change management; Information technology system: * Software changes are applied in a timely fashion in the presence of good security policies and procedures. The procedures are often automated; Control system: * Software changes must be thoroughly tested and deployed incrementally throughout a system to ensure that the integrity of the control system is maintained; * Control system outages often must be planned and scheduled days/weeks in advance; Security challenge for control systems: Real-time operations: Additional planning, testing, and slower deployment are required when implementing security solutions. System characteristic: Managed support; Information technology system: * Allow for diversified support methods; Control system: * Service support is usually via a single vendor; Security challenge for control systems: Design limitations: Solutions may be limited to those provided or supported by vendor. System characteristic: Component lifetime; Information technology system: * Lifetime on the order of 3-5 years; Control system: * Lifetime on the order of 15-20 years; Security challenge for control systems: Design limitation: Security solution should not become obsolete quickly. System characteristic: Access to components; Information technology system: * Components are usually local and easy to access; Control system: * Components can be isolated, remote, and require extensive physical effort to gain access to them; Security challenge for control systems: Design limitation: Additional time and effort required to access network components. Source: GAO analysis of NIST, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Special Publication 800-82 (Initial Public Draft). [End of table] Organizational Issues Pose Challenges to Securing Control Systems: In addition to the technical challenges of securing control systems, critical infrastructure owners face organizational challenges in securing control systems, including difficulty in developing a compelling business case for improving control systems security, a reluctance to share information on control system incidents (which could help build a business case), and the division of technical responsibilities within an organization. Experts and industry representatives reported that organizations may be reluctant to devote resources to securing control systems. These resources include money, personnel, training, and the early replacement of equipment that may have been originally designed to last 20 years or more. Until industry users of control systems have a business case to justify why additional security is needed, there may be little market incentive for the private sector to develop and implement more secure control systems. Another challenge is the reluctance to share information on control systems incidents and the resulting lack of attention to this risk. While incidents and attacks on critical infrastructure control systems have occurred, to date there is no authoritative, centralized process for collecting and analyzing information about control systems incidents. Experts we interviewed stated that companies are reluctant to share details of incidents due to factors such as legal liability and impact on their reputation. Several experts stated that they believed incidents were occurring, but are not being reported by industry. One expert suggested that since there have been no reports of significant disruptions caused by cyber attacks on U.S. control systems, industry representatives may believe the threat of such an attack is low. We have previously recommended that the government work with the private sector to improve the quality and quantity of information being shared among industries and government about attacks on the nation's critical infrastructures.[Footnote 8] Another challenge involves the way security responsibilities are structured within organizations that use control systems. Several experts and industry representatives stated that two separate groups often have responsibility for securing control systems: (1) IT security personnel and (2) control system engineers and operators. IT security personnel focus on securing enterprise systems, while control system engineers and operators focus on the reliable performance of their control systems. Because each has a different focus, the two groups face challenges in collaborating to implement secure control systems. For example, IT security personnel may be unaware of the special requirements of a control system and the control systems personnel may be unaware of the full range of security technologies that may be available. Certain challenges are inherent to control systems. However, according to experts, many of these challenges can be addressed by both the private and public sectors through proper implementation of existing technology, development of new technologies, and implementation of organizational policies and procedures and training. The Private Sector Has Multiple Initiatives Under Way to Help Secure Control Systems: Industry-specific organizations in various sectors, including the electricity, chemical, oil and gas, and water sectors, have initiatives under way to help improve control system security. These initiatives include developing standards, publishing guidance, and hosting workshops. Electricity: The electricity system of the United States and Canada has more than $1 trillion in asset value, more than 200,000 miles of transmission lines, and more than 800,000 megawatts of generating capability serving over 300 million people. The effective functioning of this infrastructure is highly dependent on control systems. As a result, private sector organizations in the electricity sector have several activities under way related to control systems security, including establishing mandatory reliability standards, developing guidelines for compliance with these standards, hosting workshops, and other activities. See table 4 for a description of key control systems security initiatives in the electricity sector. Table 4: Key Control System Security Initiatives in the Electricity Sector: Organization: North American Electric Reliability Corporation (NERC); NERC's mission is to ensure that the major transmission components of the electric system in North America are reliable, adequate, and secure. It is a self-regulatory organization that sets standards for the reliable operation and planning of the major transmission components of the electric system and monitors, assesses, and enforces compliance with those standards. Initiative: NERC promotes the development of a new mandatory system of reliability standards, authorized by the Federal Energy Regulatory Commission. The standards are meant to apply to systems such as control systems that, if compromised, could cause a threat to the large-scale power distribution system. The Energy Policy Act of 2005 established a process through which NERC is authorized to enforce compliance with these reliability standards.[A] NERC began implementing cybersecurity reliability standards that apply to control systems in June 2007. Electric utilities must be fully compliant with the standards by 2010. Organization: Electric Power Research Institute; The institute is an independent nonprofit center for energy and environmental research. It brings together members, participants, the institute's scientists and engineers, and other experts to work on solutions to the challenges of electric power. Its members represent over 90 percent of the electricity generated in the United States. Initiative: The institute has released guidelines on control systems security, including a report in 2003 and another in 2005. A recent institute report, Compliance Guidelines for Cyber Security Reliability Standards-2006 Update, provides information, recommendations, and tools to help the electric power industry comply with the mandatory NERC cybersecurity reliability standards. The institute is currently developing a tool to help asset managers create better business cases for control system security technology. According to a manager of the institute's CIP efforts, the institute also: * has a forum that meets about three times per year during which its members discuss cybersecurity incidents, including those related to control systems; * performs research on policies and procedures for securing control systems, but has not been able to develop security technology for control systems given current funding levels (the institute's security research has included various reviews of SCADA systems, determining how to secure certain products that are being used by the electric power industry, reviewing how a facility could recognize and recover from a control systems attack, and studying the use of wireless technology for SCADA systems and the inherent security risks); and; * has worked on control systems-related projects with the national laboratories, and has collaborated with DOE. For example, in 2006, the institute worked with the Pacific Northwest National Laboratory to identify the risks and vulnerabilities associated with using broadband communications for control systems and to develop mitigation strategies. According to a laboratory official, the institute and the laboratory are currently working on a project on electric power utilities' use of wireless technologies. The project is to produce two papers addressing best practices for wireless deployment in the electric sector, and guidelines for securing wireless networks, training personnel, and securely integrating wireless and wired networks. Organization: Institute of Electrical and Electronics Engineers; The institute is responsible for developing international standards for telecommunications, IT, and power generation products and services. Initiative: The Institute of Electrical and Electronics Engineers has several working groups that address issues related to control systems security in the electric power industry. Some of these work groups are developing standards for defining, specifying, and analyzing control systems. For example, the institute is developing P1689, a standard for retrofitting cybersecurity to various communications links in a control system, and P1711, a cryptographic standard for the same links. The institute is also developing P1686, which will define the functions and features to be provided in substation intelligent electronic devices to accommodate critical infrastructure protection programs. Organization: International Electrotechnical Commission; The commission prepares and publishes international standards for all electrical, electronic, and related technologies. World Trade Organization agreements permit use of these standards in international trade. Initiative: The commission's Technical Committee 57 is working to develop standards for control systems and control system components of power transmission and distribution systems, including communications and end devices called remote terminal units. It is also establishing data and communications security and communications standards for substations. The commission's Technical Committee 65 is chartered to produce standards in the area of industrial process measurement and control. Working Group 10 of the committee is developing commission standard 62443, which is a three-part standard that will address network and system cybersecurity of industrial process measurement and control systems. Source: GAO analysis of information provided by North America Electric Reliability Corporation, interviews with Federal Energy Regulatory Commission officials, Electric Power Research Institute, Institute of Electrical and Electronics Engineers, and the International Electrotechnical Commission. [A] Pub. L. No. 109-58, sec. 1211 (Aug. 8, 2005), 16 U.S.C. § 824o (2006). [End of table] Chemical: Control systems are used to monitor and control processes within the chemical industry. A $460 billion critical infrastructure sector, the chemical industry contributes nearly 3 percent of the U.S. gross domestic product and generates 6.2 million jobs. Chemical reactors may use control systems to produce chemicals or regulate temperatures within the production process. The American Chemistry Council is a trade association that represents major companies in the U.S. chemical manufacturing sector. The council supports research and initiatives related to federal regulation on health, safety, security, and the environment. The council established a Chemical Sector Cyber Security Program in 2002 to facilitate implementation of the Chemical Sector Cyber Security Strategy. Updated in 2006, the strategy, as well as the Guidance for Addressing Cyber Security in the Chemical Industry, addresses manufacturing and control system security efforts and guidance on how to secure these systems. Further, within the cybersecurity program, the Manufacturing and Control Systems Security Work Team was developed to collect, identify, and facilitate the use of practices for securing manufacturing and control systems and to establish a network of manufacturing and control systems subject matter experts. Oil and Gas: The United States has more than 2 million miles of pipelines delivering oil and natural gas. In 2005, the consumption of natural gas totaled about 22,000 billion cubic feet, and in the United States, 20,802,000 barrels of petroleum were consumed per day. Both the gas and oil industries use control systems for process management and monitoring purposes. Employing integrated control systems, these industries can control the refining operations at a plant site, remotely monitor the pressure and flow of gas pipelines, and control the flow and pathways of gas transmissions. The sector-specific plan for the energy sector (which includes oil and gas) includes a discussion of selected control systems security efforts within the sector. The oil and gas sector has multiple control systems security activities under way, in particular, standards relating to security of control systems. See table 6 for a description of key control systems security efforts in the oil and gas sector. Table 5: Key Control System Security Initiatives in the Oil and Gas Sector: Organization: American Gas Association; A trade organization that advocates for local natural gas utility companies and provides a broad range of programs and services for member natural gas pipelines, marketers, international gas companies, and industry associates. Initiative: The American Gas Association's Automation and Telecommunication and Gas Control committees supported the development of a report that would recommend how to apply encryption to protect gas utility control systems. A task group was organized to develop Standard AGA Report No.12, Cryptographic Protection of SCADA Communications, which consists of four parts. The first part, Background, Policies, and Test Plan, published in March 2006, is intended to serve as a guideline for voluntary implementation of a comprehensive cybersecurity posture. This report sets up the risk assessment process and allows owners and operators to determine if encryption is a good security practice for their control systems. The second part, Retrofit Link Encryption for Asynchronous Serial Communications, has not yet been finalized. This part contains functional requirements and details technical specifications for AGA-12 compliant retrofit devices used in control systems. Both the third and fourth parts have not yet been developed. The third part, Protection of Networked Systems, is to focus on high- speed communication systems for control systems, including the Internet. The final part, Protection Embedded in SCADA Components, is to focus on protecting control systems by incorporating cryptography into system components at the time of manufacture. The second, third, and fourth parts of this report are expected to be developed under the leadership and technical expertise of the Gas Technology Institute with user input from the membership of the American Gas Association. Organization: American Petroleum Institute; A national trade association for America's oil and natural gas industry. The institute's corporate members include various segments of the oil industry, such as producers, refiners, suppliers, pipeline operators and marine transporters, as well as service and supply companies that support all segments of the industry; Initiative: The institute published standard 1164, Pipeline SCADA Security, in September 2004. This standard provides guidance to the operators of oil and gas liquid pipeline systems for managing critical infrastructure control systems integrity and security. This guideline is specifically designed to provide the operators with a description of industry practices in critical infrastructure control systems security and to provide the framework needed to develop sound security practices within the operator's individual companies. The institute published standard 1165, Recommended Practice for Pipeline SCADA Displays, in January 2007. This recommended practice focuses on the design and implementation of displays used for displaying, monitoring, and controlling information on pipeline control systems. Source: GAO analysis of information provided by American Gas Association, Interview with Department of Energy officials, American Petroleum Institute. [End of table] Water: The water sector includes drinking water and water treatment systems. The sector's infrastructures are diverse, complex, and distributed, ranging from systems that serve a few customers to those that serve millions. The sector includes about 150,000 water, wastewater, and storm water organizations; federal water offices at the national, regional, and state levels belonging to several agencies; some 100 state water agency organizations; and many other local government water organizations. Members of the water sector have worked with the Environmental Protection Agency on development of the Water Sector- Specific Plan, which includes some efforts on control systems security. Members of the water sector are also participating in the Process Control Security Forum's activities. See table 7 for a list of key control system security initiatives by various organizations in the water sector. Table 6: Key Control System Security Initiatives in the Water Sector: Organization: Awwa Research Foundation; An international nonprofit organization that sponsors research to enable water utilities, public health agencies, and other professionals to provide safe and affordable drinking water to consumers. Initiative: The foundation is currently working on two research projects. The first is the Cryptographic Protection of SCADA Communications for Water Systems #2969, which will develop a standard suite of equations and protocols to provide cybersecurity for water utility SCADA systems. The second, which is in collaboration with DHS, is the Control Systems Cyber Security Self Assessment Tool #3045, which is to identify, organize, prioritize, and describe the most probable electronic security threats; risks associated with vulnerabilities, available prevention technology, best practices, and critical areas of uncertainty. In 2002, the foundation developed a vulnerability assessment methodology for large drinking water utilities to assist them in meeting federally mandated vulnerability assessments. Now that deadlines for vulnerability assessments have passed, utilities may still use the methodology to develop emergency response plans. The methodology has also been adapted for use at small and medium-sized utilities. Organization: Association of Metropolitan Water Agencies; An organization of the largest publicly owned drinking water systems in the United States. The association collects and exchanges management, security, legislative, and technical information to support competitive utility operations, effective utility leadership, safe and secure water supplies, and effective public communication on drinking water quality. Initiative: The association served as the U.S. EPA-designated liaison between the water sector and the federal government on critical infrastructure protection and currently operates the Water Information Sharing and Analysis Center and the Water Security Channel. The Water Information Sharing and Analysis Center offers a secure database, expert analysis, information gathering, and the rapid distribution of reports and government alerts about threats to America's drinking water and wastewater utilities, including control systems. The center went online in December 2002. The Water Security Channel is a free service of the center designed to disseminate security information to the broadest wastewater and drinking water community, including information about control systems security issues. Members of the association have held workshops, events, formed committees, and written papers that deal with cyber and control systems security. Source: American Water Works Association, Association of Metropolitan Water Agencies. [End of table] Other Organizations: Other organizations are working on efforts to improve control systems security that are not sector-specific. The organization formerly known as the Instrumentation, Systems, and Automation Society, and now called ISA, is currently working on control systems security efforts, and InfraGard, a nonprofit organization associated with the Federal Bureau of Investigation, has recently started a control systems-related effort. See table 8 for a description of these initiatives. Table 7: Control System Security Initiatives that Affect Multiple Sectors: Organization: ISA (formerly the Instrumentation, Systems, and Automation Society); The society develops standards, certifies industry professionals, provides education and training, and publishes books and technical articles. Initiative: The society's industrial automation and control systems' Security Standards Committee is composed of representatives from many industries, including water/wastewater, fossil fuels, nuclear energy, food and beverages, pharmaceuticals, chemicals, petrochemicals, U.S. government labs and organizations, and automotive and educational institutions. The committee intends to establish standards, recommend practices, and develop technical reports and related information that will define procedures for implementing electronically secure industrial automation and control systems and security practices and assess electronic security performance. The committee has finished two technical reports. One report documents the current state of cybersecurity technologies as they are applied to the control systems environment to clearly define what can reasonably be deployed today and to define areas where more research is needed. A second report presents an approach for developing, implementing, and operating a program that addresses security for control systems. The committee is currently working on a standard to establish and operate an industrial automation and control systems security program and specific security requirements for industrial automation and control systems. The first part deals with terminology and has been approved by the society. The second part deals with establishing a security program and is currently awaiting approval by the committee. The third part deals with operating the program and has not been started. The fourth part deals with technical security requirements and was started in October 2006. The committee has also recently started a related working group on patch management. Organization: InfraGard/SCADAGard; InfraGard is a nonprofit organization associated with the Federal Bureau of Investigation. The program consists of 86 regional chapters with representatives from the public and private sectors. The program focuses on activities related to critical infrastructure protection and cyber crime. Initiative: InfraGard recently established a SCADAGard special interest group. According to the head of the group, the group will be used to share control systems security information with InfraGard members who are control systems vendors, owners, and operators and have previously been vetted by the Federal Bureau of Investigation. Source: GAO analysis of information provided by ISA and InfraGard. [End of table] Federal Agencies Have Multiple Initiatives to Help Secure Critical Infrastructure Control Systems, but More Remains to Be Done: Over the past few years, federal agencies--including DHS, DOE, NIST, FERC, and others--have initiated efforts to improve the security of critical infrastructure control systems. However, DHS has not yet established a strategy to coordinate the various control systems activities across federal agencies and the private sector. Further, more can be done to address specific weaknesses in DHS's ability to share information on control systems vulnerabilities. Until DHS develops an overarching strategy, there is an increased risk that the federal government and private sector will invest in duplicative initiatives and miss opportunities to learn from other organization's activities. Further, until DHS addresses specific weaknesses in sharing information, there is an increased risk that the agency will not be able to effectively carry out its responsibility for sharing information on vulnerabilities, and that there could be a disruption to our nation's critical infrastructures. Federal Agencies Have Many Initiatives Under Way, but DHS Lacks a Comprehensive Strategy that Delineates Responsibilities and Coordinates Activities: There are many federal efforts under way to help improve the security of critical infrastructure control systems. For example, DHS is sponsoring multiple control systems security initiatives across critical infrastructure sectors, including a program to improve control systems cybersecurity that includes vulnerability reporting and response, activities to promote security awareness within the control systems community, and efforts to build relationships with control systems vendors and infrastructure asset owners. See appendix II for a detailed description of DHS's key initiatives and projects involving control systems security. Additionally, DOE sponsors control systems security efforts within the electric, oil, and natural gas industries. These efforts include the National SCADA Test Bed Program, which funds testing, assessments, and training in control systems security and the development of a road map for securing control systems in the energy sector. Also, several of DOE's national laboratories play an important role in implementing many DHS and DOE efforts and provide support directly to asset owners and vendors. For example, the national laboratories perform site assessments, test vendor equipment, and conduct outreach and awareness activities for infrastructure asset owners and vendors. See appendix III for more information on DOE's initiatives. Other federal agencies, such as NIST and FERC, have also undertaken efforts to help secure control systems. For example, NIST is working with federal and industry stakeholders to develop standards, guidelines, checklists, and test methods to help secure critical control systems, while FERC is working to implement electricity reliability standards that address control systems. See appendix IV for more information on these and other initiatives. Several industry experts we spoke with stated that many federal programs in control systems security have been helpful. For example, experts stated that developing the road map was a positive step for the energy sector. An official who participated in the development of DOE's road map stated that the process succeeded in identifying industry needs and was a catalyst for bringing agencies and government coordinating councils together and that it was a good idea for other industries to develop plans similar to the road map. In addition, experts we interviewed said the testing and site assessments conducted by the national laboratories for DHS and DOE made individual products more secure and helped improve overall attention to control systems security. However, the federal government does not yet have an overall strategy for guiding and coordinating control systems security efforts across the multiple agencies and sectors. To evaluate activities related to critical infrastructure protection, we developed a risk management framework for protecting critical infrastructures based on the standards and practices of leading organizations.[Footnote 9] The first phase of this framework is the development of a strategy that includes the goals, objectives, constraints, specific activities, milestones, and performance measures needed to achieve a particular end result. In 2004, we reported that federal agencies, standards organizations, and the private sector were leading various initiatives on control systems security, but lacked coordination and oversight to effectively improve the cybersecurity of the nation's control systems.[Footnote 10] We recommended that DHS develop and implement a strategy for coordinating control systems security efforts among government agencies and the private sector. DHS agreed with our recommendation to develop a control systems security strategy and, in 2004, issued a strategy that focuses primarily on DHS's initiatives. However, the strategy does not include ongoing work by DOE, FERC, NIST, and others. Further, it does not include the various agencies' responsibilities, goals, milestones, or performance measures. Agency officials stated they have convened a federal working group that will develop a list of control systems security activities across the government. Further, in commenting on a draft of this report, DHS officials stated that this baseline list of activities will serve as the foundation for a comprehensive strategy across the public and private sectors. However, they did not provide a date for when the baseline and the comprehensive strategy would be completed. In addition, they did not state whether the list or the strategy would include responsibilities, goals, milestones, or performance measures. Until DHS develops an overarching strategy that delineates various public and private entities' roles and responsibilities and uses it to guide and coordinate control systems security activities, the federal government and private sector risk investing in duplicative activities and missing opportunities to learn from other organization's activities. DHS Faces Challenges in Sharing Sensitive Information on Control Systems Vulnerabilities: DHS is responsible for sharing information with critical infrastructure owners on control systems vulnerabilities, but faces challenges in doing so. In 2006, DHS developed a formal process for managing control systems vulnerabilities reported to the U.S. Computer Emergency Readiness Team (US-CERT).[Footnote 11] DHS gathers this information and works with vendors and others to identify mitigation strategies. It then releases this information to critical infrastructure owners and operators, control systems vendors, and the public. However, DHS's sharing of sensitive information on control systems to date has been limited. As of June 2007, US-CERT has issued only nine notices related to control systems security since the inception of the control systems security program in 2003. DHS's information sharing is limited in part because of reluctance by those in the private sector to inform the agency of vulnerabilities they have identified and in part because of weaknesses in DHS's ability to disseminate potentially sensitive information to the private sector. We previously reported on difficulties DHS has had in collecting information from, and sharing it with, the private sector.[Footnote 12] Industry officials stated that they are reluctant to share information about incidents because of uncertainties about how the information will be used and the value of reporting such incidents. In addition, DHS lacks a rapid, efficient process for disseminating sensitive information to private industry owners and operators of critical infrastructures. An agency official noted that sharing information with the private sector can be slowed by staff turnover and vacancies at DHS, the need to brief agency and executive branch officials and congressional staff before briefing the private sector, and difficulties in determining the appropriate classification level for the information. DHS's control systems security program manager acknowledged the need to share information more quickly. In commenting on a draft of this report, DHS officials stated that after the start of our review, the agency began developing a process to formalize and improve information sharing. However, this process was not evident during our review. Further, DHS did not provide evidence of this process or examples of how the process had actually been used to share information. Until DHS establishes an approach for rapidly assessing the sensitivity of vulnerability information and disseminating it--and thereby demonstrates the value it can provide to critical infrastructure owners--the agency's ability to effectively serve as a focal point in the collection and dissemination of sensitive vulnerability information will continue to be limited. Without a trusted focal point for sharing sensitive information on vulnerabilities, there is an increased risk that attacks on control systems could cause a significant disruption to our nation's critical infrastructures. Conclusions: Control systems are an essential component of our nation's critical infrastructure. Past incidents involving control systems, system vulnerabilities, and growing threats from a wide variety of sources highlight the risk facing these systems. The public and private sectors have begun numerous activities to improve the cybersecurity of these systems. However, the federal government lacks an overall strategy for coordinating public and private sector efforts. DHS also lacks an efficient process for sharing sensitive information on vulnerabilities with private sector critical infrastructure owners. Until an overarching strategy is in place, public and private sectors risk undertaking duplicative efforts. Also, without a streamlined process for advising private sector infrastructure owners of vulnerabilities, DHS is unable to fulfill its responsibility as a focal point for disseminating this information. If key vulnerability information is not in the hands of those who can mitigate its potentially severe consequences, there is an increased risk that attacks on control systems could cause a significant disruption to our nation's critical infrastructures. Recommendations for Executive Action: To improve federal government efforts to secure control systems governing critical infrastructure, we recommend that the Secretary of the Department of Homeland Security implement the following two actions: * develop a strategy to guide efforts for securing control systems, including agencies' responsibilities, as well as overall goals, milestones, and performance measures, and: * establish a rapid and secure process for sharing sensitive control system vulnerability information with critical infrastructure control system stakeholders, including vendors, owners, and operators. Agency Comments and Our Evaluation: We received comments via e-mail on a draft of this report from DHS officials, including the Deputy Director of the National Cyber Security Division. In the comments, agency officials neither agreed nor disagreed with our recommendations. Instead, they stated that DHS would take the recommendations under advisement. Additionally, officials stated that the agency has recently begun working with its partners in the Federal Control System Security Working Group to establish a baseline of ongoing activities. This baseline is to serve as a foundation for developing a comprehensive strategy that will encompass the public and private sectors, set a vision to secure control systems, describe roles and responsibilities, and identify future requirements for resources and action. Moreover, officials stated that the agency has recently developed a process to formalize the sharing of sensitive information related to control systems vulnerabilities. The officials reported that this process describes the information flow from vulnerability discovery, to validation, public and private coordination, and outreach and awareness. Further, it identifies the deliverables and outcomes expected at each step in the process. While DHS's intention to develop a comprehensive public/private strategy is consistent with our recommendation, the agency did not provide a date by which this strategy will be completed. Until DHS completes the comprehensive strategy, the public and private sectors risk undertaking duplicative efforts. Additionally, while DHS officials stated that the agency had developed a process for sharing sensitive information on control system vulnerabilities, it did not have such a process in place during our review. Further, the agency has not provided evidence of its process for sharing control system vulnerability information or evidence that this process has been used to share information. Until such a process is formalized and implemented, key vulnerability information may not be available to those who can mitigate its potentially severe consequences, therefore increasing the risk that attacks on control systems could cause a significant disruption to our nation's critical infrastructures. DHS officials and officials from other agencies who contributed to this report provided technical comments, which we have incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution of it until 30 days from the report date. At that time, we will send copies of this report to interested congressional committees, the Secretary of the Department of Homeland Security, and other interested parties. In addition, this report will be available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you have any questions on matters discussed in this report, please contact Dave Powner at (202) 512-9286 or Keith Rhodes at (202) 512- 6412, or by e-mail at pownerd@gao.gov and rhodesk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix V. Signed by: David A. Powner: Director: Information Technology Management Issues: Signed by: Keith A. Rhodes: Chief Technologist Director: Center for Technology and Engineering: List of Requesters: The Honorable Joseph I. Lieberman: Chairman: The Honorable Susan M. Collins: Ranking Member: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable James R. Langevin: Chairman: The Honorable Michael T. McCaul: Ranking Member: Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology: Committee on Homeland Security: House of Representatives: The Honorable Sheila Jackson-Lee: Chairwoman: The Honorable Daniel L. Lungren: Ranking Member: Subcommittee on Transportation Security and Infrastructure Protection: Committee on Homeland Security: House of Representatives: [End of section] Appendix I: Objectives, Scope, and Methodology: Our objectives were to (1) determine cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems; (2) determine the challenges to securing critical infrastructure control systems; (3) identify private sector initiatives to strengthen the cybersecurity of control systems; and (4) assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems. To determine the cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems, we reviewed prior GAO reports on control systems as well as reports prepared by other government agencies and private organizations, including documentation of prior control system security incidents. We conducted interviews with individuals in the private sector, including representatives of private companies that operate control systems. These individuals were selected based on their knowledge of and participation in both private and public sector control system security activities. We also met with representatives from trade associations and federal agencies. On the basis of the information and documentation we received from these individuals, and information we collected during site visits to three of the national laboratories, we were able to compile information on the cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems. To determine the challenges to securing critical infrastructure control systems, we reviewed prior GAO reports and testimonies and materials written by other public and private organizations on control systems security, critical infrastructure protection, and national preparedness. We conducted interviews with experts and industry representatives, including managers of federal control systems programs at the Department of Homeland Security (DHS) and Department of Energy (DOE), experts from the national laboratories, vendors, owners and operators, and standards and trade associations. To identify the private sector initiatives to strengthen cybersecurity of control systems, we researched current standards and accepted trade practices and analyzed current efforts to better secure control systems. We spoke to private sector owners and operators, vendors, trade associations, industry experts, and standards associations. These organizations included the North American Electric Reliability Corporation (NERC), the American Gas Association, and ISA. To assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems, we researched relevant federal laws and regulations and initiatives by federal agencies to better secure control systems, and reviewed documentation and project plans on federal control systems efforts. We also reviewed GAO's prior work analyzing best practices from leading organizations and interviewed private sector and other experts in control systems security for their perspectives on federal efforts. We interviewed officials from federal agencies including DHS, DOE, the National Institute of Standards and Technology (NIST), and the Federal Energy Regulatory Commission (FERC). In addition, we visited three of the national laboratories that are leading control systems security research and outreach efforts. These labs were selected because of their extensive participation in DOE and DHS control systems security programs. We then compared the activities of federal agencies with best practices and the perspectives of experts. Our work was conducted from March 2007 to July 2007 at agencies' headquarters in Washington, D.C., and at national laboratories in Idaho, New Mexico, and Washington state in accordance with generally accepted government auditing standards. [End of section] Appendix II: The Department of Homeland Security's Control Systems Security Initiatives: DHS supports multiple control systems security initiatives across government and the private sector. Table 9 lists key initiatives and projects conducted by DHS in control system security. Table 8: Selected DHS Control Systems Security Initiatives: Initiative: Coordination with US-CERT; Description: DHS's control systems program is working to enhance management of control system incidents and provide timely situational awareness information to control systems owners and operators through coordination with the United States Computer Emergency Readiness Team (US-CERT). According to agency officials, a person from the program works in the US-CERT operations center and handles any incoming threats or vulnerabilities related to control systems. The Idaho National Laboratory provides backup technical support if needed. DHS also provides outreach and awareness on the role of US-CERT in reporting and mitigating control systems cyber vulnerabilities, and is developing the capability to analyze software harmful to control systems. Initiative: Control System Cyber Security Self Assessment Tool; Description: DHS has developed the Control Systems Cyber Security Self Assessment Tool to assist control systems owners and operators in evaluating vulnerabilities and recommending mitigation strategies. This software takes users through a series of questions to determine the current status of their control systems network. It includes specific control systems architectures recommended by the National Institute of Standards and Technology as examples for end users and uses existing standards and recommended practices to provide the user a set of requirements for addressing specific security measures. The software was piloted in 2006 in several critical infrastructure sectors, and was deployed to the water sector in June 2007. According to agency officials, the software has also been tested in the electric sector and oil and gas sectors. According to DHS officials, in the future, the department plans to turn over development and maintenance of the software to a commercial vendor. Initiative: Process Control System Forum; Description: In February 2005, DHS launched the first Process Control System Forum. The forum is primarily a means for the government to reach out to academia, vendors, and owners and operators of critical infrastructure. In March 2007, the forum was held in Atlanta, Georgia, and included approximately 200 attendees. Initiative: Cyber Security Procurement Language for Control Systems; Description: The Cyber Security Procurement Language for Control Systems project is an initiative that DHS sponsored together with Idaho National Laboratory, the Multi-State Information Sharing and Analysis Center, and private industry. The purpose of the project is to summarize security principles that should be considered when designing and procuring control systems products and provide examples of language to incorporate into procurement specifications. According to an industry expert, the language has been used by owners procuring new control systems equipment. NIST officials stated that they are considering integrating this project into the Control System Cyber Security Self Assessment Tool (see previous section), by identifying the procurement language that would be necessary to address an identified vulnerability. In January 2007 the National Infrastructure Advisory Council[A] issued a report recommending that the Office of Management and Budget mandate that federal agencies apply the procurement language when procuring control systems and services. Initiative: Catalog of Control System Security Requirements; Description: DHS is also in the process of developing a Catalog of Control System Security Requirements. This initiative will provide a catalog of recommended requirements to facilitate the development and implementation of control systems cybersecurity standards to be applied to critical infrastructure. DHS and NIST officials stated that this will provide a common terminology that can be used for standards development and can therefore promote collaboration or convergence of industry standards. The catalog was used by NIST during the development of control systems- related guidance and, according to agency officials, was sent to ISA, a standards association, and the International Electrotechnical Commission for consideration. The catalog is currently in draft form. Initiative: Monthly Vendor Phone Calls; Description: DHS hosts monthly teleconference meetings with control systems vendors to provide a forum for the vendors to share information and common concerns, and to discuss control systems security needs for legacy and next generation products. According to agency officials, approximately 30 vendors representing most of the sectors using control systems are participating in the calls. At the most recent Process Control System Forum conference, the vendors held their first face-to- face meeting. The DHS Control System Security Program Director stated that approximately 90 percent of the control systems manufacturers in the United States were represented at this meeting. Initiative: Federal Control Systems Working Group; Description: This group represents the federal control systems community and it is currently working on development of a baseline of federal control systems security efforts and enhancing information sharing with relevant stakeholders. Initiative: National Laboratory Assessments and Training; Description: DHS funds initiatives at DOE laboratory facilities including control systems site and vendor assessments and training. For more information, see appendix III. Initiative: Institute for Information Infrastructure Protection; Description: In January 2002, the Institute for Information Infrastructure Protection, a consortium made up of 27 entities managed by Dartmouth College, began operation. In 2005, the institute launched the Process Control Systems Security Research Project. This project focuses on cybersecurity-related research in the oil and gas sector. Initiatives completed include a source code checking tool, an intrusion detection and event correlation tool for process control systems, and a tool for building a business case for investing in security. According to program officials, currently there are two main bodies of work: (1) work that is drawing to a close from $8.5 million in funding from DHS's Science and Technology Directorate and (2) a new body of work that received $4.1 million in funding from DHS's National Cyber Security Division. Institute officials stated that the new work is under way as of April 2007, and will also focus on solutions for survivability and recovery of process control systems in the oil, gas, and chemical industries. Initiative: Linking the Oil and Gas Industry to Improve Cyber Security; Description: The Linking the Oil and Gas Industry to Improve Cyber Security project was a cooperative initiative between DHS's Science and Technology Directorate and companies in the oil and gas industry that ran from July 2005 to June 2006. The program's purpose was to identify new technologies for protecting process control systems. The program included a 14-member consortium of private sector oil and gas companies. DHS officials stated that the project was a precompetitive research and development project, and therefore the agency was able to provide support to begin the project and will likely play a role in the technology transfer process. The consortium of companies selected six vendor products to be included in the project. The consortium worked with Sandia National Laboratories on integrating and testing the six products, which resulted in a potentially viable security solution. The integrated solution was demonstrated to the participating organizations at a wrap-up meeting in Houston, Texas, on September 11, 2006. Initiative: Small Business Innovation Research Awards; Description: According to agency officials, from 2004 to 2005 DHS's Science and Technology Directorate funded 13 research proposals related to control systems security. The proposals received individual awards of up to $100,000 and lasted no more than 6 months in duration. On the basis of the results of these proposals, DHS awarded five small business innovation research awards. These awards were up to $750,000 and typically were for no more than 2 years in duration. The last of these awards was completed in February 2007. Agency officials stated that oil and gas owners and operators have shown particular interest in continuing work on intrusion detection, encryption, and authentication of users. Initiative: Chemical Facilities Security Standards; Description: The 2007 DHS Appropriations Act required that DHS issue interim final regulations establishing security standards for chemical facilities. The regulations require vulnerability assessments and the development and implementation of site security plans for these facilities, and DHS must audit and inspect the facilities. DHS issued the regulations in April 2007, explicitly extending their applicability to control systems. Initiative: Pipeline Control Systems Safety; Description: The Transportation Security Administration's Pipeline Security Division conducts a corporate security review process for major pipeline operators that includes a high-level review of control systems security. As of June 2007, the division has conducted approximately 65 reviews. In addition, the administration is working on a pilot project involving assessments of security policies and control systems security for a particular pipeline operator. Source: GAO analysis of information provided by DHS and the Institute for Information Infrastructure Protection. [A] The National Infrastructure Advisory Council was chartered on July 1, 2005 to provide the President, through the Secretary of the Department of Homeland Security, with advice on the security of the critical infrastructure sectors and their information systems. [End of table] [End of section] Appendix III: The Department of Energy's Initiatives to Support Control Systems Security within the Energy Sector: Since 2003, the Department of Energy's Office of Electricity Delivery and Energy Reliability has led control systems security efforts within the electric, oil, and natural gas industries by establishing the National SCADA Test Bed Program and developing a 10-year strategic framework for securing control systems in the energy sector. DOE's national laboratory facilities also play an important role in control systems security research. In particular, the Idaho National Laboratory, Sandia National Laboratories, and the Pacific Northwest National Laboratory lead key efforts in control systems security research for DOE, DHS, and other public and private organizations. The National SCADA Test Bed Program: In 2004, DOE launched the National SCADA Test Bed Program, a multilaboratory effort to identify control systems vulnerabilities, conduct control systems research and development, and provide cybersecurity training and outreach to industry. The test bed program includes five DOE laboratories and has a budget of $10 million for fiscal year 2007. To date, the test bed program has completed 12 control systems vulnerability assessments in cooperation with control systems vendors and energy sector owners and operators. As a result of these assessments, the test bed team has provided vendors with recommendations to improve control systems security, and owners and operators with strategies for mitigating existing system security risks. The test bed program also has 10 ongoing control systems research and development projects that are peer-reviewed biannually to ensure they meet the needs of the government and the end users. In addition to its testing and research efforts, the program has led training workshops on control systems security for over 1,500 industry personnel, and has established a working group to evaluate control systems security standards in the energy sector. Strategic Framework for Securing Control Systems in the Energy Sector: In January 2006, DOE released the Roadmap to Secure Control Systems in the Energy Sector, a collaborative public-private strategy for securing control systems infrastructures over the next 10 years. Developed jointly by energy owners and operators, researchers, vendors, and the government, the road map links near-, mid-, and long-term security needs with four main goals: (1) measure and assess the current security posture; (2) develop and integrate protective measures; (3) detect intrusion and implement response strategies; and (4) sustain security improvements. The road map outlines the energy sector's top control systems security concerns and existing mitigation efforts, and is serving as a model for other sectors to develop similar plans. For example, in January 2007, DHS's National Infrastructure Advisory Council recommended that DHS and the sector-specific agencies develop plans using DOE's road map as a model. DOE has used the road map to align its test bed projects with strategic goals. In addition, DOE has created an online road map that uses the strategic framework to track public and private sector control systems security projects. National Laboratories Are Leading Significant Portions of Control Systems Security Work: DOE owns 17 laboratories and research facilities around the country that play an important role in control systems security research. In particular, the Idaho National Laboratory, the Sandia National Laboratories, and the Pacific Northwest National Laboratory manage and conduct key efforts in control systems security research for DOE, DHS, and other public and private organizations. Using their research facilities, the laboratories are able to conduct work for DHS, DOE, and other organizations. Research Facilities: The laboratories are able to use a number of unique research facilities to test control systems equipment. For example, Idaho National Laboratory operates its own electrical power transmission facility, which consists of 61 miles of high-voltage transmission lines, feeders, transformers, and independent substations (see fig. 5). According to laboratory officials, because portions of the transmission facility are easy to separate from the overall power grid, control systems equipment can be tested on the grid without fear of effects on the larger power grid. [End of section] Figure 5: A Substation That Is Part of Idaho National Laboratory's Facilities for Testing Control Systems (photograph): [See PDF for image] [End of figure] The Pacific Northwest National Laboratory has the Electricity Infrastructure Operations Center, which is a replica of a typical operations center used in the electric industry, with consoles, displays, hardware, and software that can be used for control of electricity transmission (see fig. 6). The center receives live transmission data from actual utility control systems, and is used as a platform for research, development, and demonstration. [End of section] Figure 6: The Pacific Northwest National Laboratory's Electricity Infrastructure Operations Center (photograph): [See PDF for image] [End of figure] DHS Sponsors Laboratory Activities Involving Control Systems Security: The national laboratories manage key efforts for DHS related to control systems security. For example, the Idaho National Laboratory is the lead laboratory to support and execute the DHS Control Systems Security Program. According to laboratory officials, the laboratories coordinate activities funded through DHS with those funded through the National SCADA Test Bed of the Department of Energy. For example, Idaho National Laboratory has conducted five vendor assessments and six site assessments using DHS funds and eight vendor assessments and four site assessments using DOE funds. Additionally, the Idaho, Pacific Northwest, and Sandia National Laboratories developed training for asset owners and operators. The Idaho National Laboratory has developed 4-and 8-hour classes on control systems security that it has given to approximately 1,500 industry personnel since 2005. In 2006, the Pacific Northwest National Laboratory developed online control systems security awareness training that has been published on US-CERT's Web site. In 2007, Sandia National Laboratories developed training to educate owners and operators on how to effectively use red teaming to improve the security posture of their control systems.[Footnote 13] Further, the Idaho National Laboratory has worked with George Mason University and New York University to develop a draft master's level course curriculum on critical infrastructure and control systems security. DOE's National SCADA Test Bed Sponsors Laboratory Activities: Under DOE's National SCADA Test Bed Program, the national laboratories have worked both independently and collaboratively on performing vendor vulnerability assessments, conducting control systems research and development, and leading industry training and outreach.[Footnote 14] For example, between 2004 and 2007, the Idaho National Laboratory conducted assessments of eight different control systems for the electricity sector. According to laboratory officials, vendors provide the lab with the hardware, software, and training necessary to run the control system; this represents a $1 million to $1.5 million investment by the vendor. Largely on the basis of the results of these assessments, vendors have chosen to develop system patches, reconfigure system architectures, and build enhanced systems, which have been retested by the laboratory. Furthermore, according to an agency official, the results of the vendor assessments have helped inform other federal control systems efforts, such as the development of the control system self assessment tool. In addition, the Idaho National Laboratory has conducted four on-site control system assessments for electricity sector owners and operators. In addition to vendor assessments, the laboratories are engaged in 10 research projects that are to help industry stakeholders analyze control systems operations and improve the security and reliability of architectures for control systems. For example, the Pacific Northwest National Laboratory has developed a technology to encapsulate control systems communications between two devices with a unique identifier and authenticator. This technology enables the devices to verify that the communication has not been tampered with. Unlike comparable technologies for standard information technology (IT) systems, the authentication technology does not require substantial amounts of bandwidth or processing power. Importantly, this technology has the potential to be applied to both new systems and older control systems. In addition, the Idaho, Pacific Northwest, and Sandia National Laboratories are working on identifying vulnerabilities in the current communications protocol used between control centers, testing mitigation techniques, and, ultimately, assisting industry in implementing a secure version of the protocol. Other Organizations Sponsor Laboratory Activities: In addition to work for DHS and DOE, the laboratories have conducted control systems security work for other public and private organizations, including research, security assessments, and training. For example, the laboratories have performed security assessments of control systems for federal operators of critical infrastructure, including the Bureau of Reclamation, Tennessee Valley Authority, Bonneville Power Administration, and the Strategic Petroleum Reserve, as well as private sector utility companies. Moreover, the Pacific Northwest National Laboratory worked with the Nuclear Regulatory Commission and the Nuclear Energy Institute to develop a self- assessment methodology for nuclear plants to determine compliance with standards. [End of section] Appendix IV: Other Agencies' Initiatives to Help Secure Critical Infrastructure Control Systems: In addition to DHS and DOE, multiple other federal agencies and entities are working to help secure critical infrastructure control systems. Initiatives undertaken by the Federal Energy Regulatory Commission, the National Institute of Standards and Technology, the Environmental Protection Agency, and others are described here. Federal Energy Regulatory Commission: Under the Energy Policy Act of 2005, the Federal Energy Regulatory Commission (FERC) was authorized to (1) appoint an electricity reliability organization to develop and enforce mandatory electricity reliability standards, including cybersecurity, and (2) approve, remand, or require modification to each proposed standard. The agency may also direct the reliability organization to develop a new standard or modify existing standards. Both the agency and the reliability organization have the authority to enforce approved standards, investigate incidents, and impose penalties (up to $1 million a day) on noncompliant electricity asset users, owners, or operators. FERC has conducted several activities to begin implementing the requirements of the act. In July 2006, FERC certified the North American Electric Reliability Corporation (NERC) as the electric reliability organization. In December 2006, FERC released a staff assessment of NERC's eight Critical Infrastructure Protection (CIP) reliability standards, which include standards for control systems security. FERC found that while the standards were a good start, there were a number of items that required improvement, including ambiguous language for standards requirements, measurability, and degrees of compliance; insufficient technical requirements to ensure grid reliability; and the use of "fill-in-the-blank standards," which are not enforceable. NERC agreed that the standards represented a starting point and has proposed a work plan to address the deficiencies. In July 2007, FERC issued a notice of public rulemaking in which it proposed to approve eight CIP reliability standards while directing NERC to modify the areas of these standards that require improvement. After considering public comments on the notice of public rulemaking, which are due in late September 2007, FERC plans to issue its final rule on the CIP reliability standards. The National Institute of Standards and Technology Is Developing Standards and Guidance to Improve Control Systems Security: The National Institute of Standards and Technology (NIST) is working with federal and industry stakeholders to develop standards, guidelines, checklists, and test methods to help secure critical control systems. For example, NIST is currently developing guidance for federal agencies that own or operate control systems to comply with federal information system security standards and guidelines.[Footnote 15] The guidance identifies issues and modifications to consider in applying information security standards and guidelines to control systems. Table 10 lists key NIST efforts. Table 9: NIST Control Systems Security Efforts: Initiative: Industrial Control Systems Security Project; Description: The project intends to build on current federal security standards and provide targeted extensions and/or interpretations of those standards for industrial and process control systems where needed. Initiative: Special Publication 800-53, Recommended Security Controls for Federal Information Systems, Revision 1 --Appendix I: Industrial Control Systems: Interim Guidance on the Application of Security Controls; Description: NIST is currently working on applying Special Publication (SP) 800-53, Recommended Security Controls for Federal Information Systems, to control systems. NIST SP 800-53 was originally developed for the traditional IT environment, and it treats control systems as information systems. However, organizations have had difficulties in using SP 800-53 to protect their control systems due to the unique needs of control systems. Through the results of NIST workshops held in April 2006 and March 2007, NIST developed and, in July 2007, released an augmentation to SP 800-53 that addresses control systems. According to agency officials, while most controls in SP 800-53 are applicable to control systems as written, several controls do require supplemental guidance and enhancements. NIST officials stated they plan to hold a workshop in late summer 2007, to include representatives from national and international control systems communities to share information, obtain input, and determine their level of interest in voluntarily adopting and using NIST's industrial control system interpretation of SP 800-53. Initiative: Special Publication 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; Description: NIST is developing Special Publication 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. The publication is a guidance document on how to secure control systems, including the security of legacy systems. An initial public draft was released in September 2006, and the publication is due for second public draft release in August 2007. Initiative: NIST Special Publication 1058, Using Host-Based Antivirus Software on Industrial Control Systems: Integration Guidance and a Test Methodology for Assessing Performance Impacts; Description: NIST and Sandia National Laboratories, under the guidance and sponsorship of DOE's Office of Electricity Delivery and Energy Reliability and its National SCADA Test Bed Program, investigated and tested the impacts of commercial, off-the-shelf antivirus software on control system performance. A guidance document was released in September 2006. Initiative: Process Controls Security Requirements Forum; Description: NIST organized the Process Controls Security Requirements Forum to establish security specifications that can be used in the procurement, development, and retrofit of industrial control systems. The forum's membership includes representatives from the water, electric, chemical, and petrochemical industries; U.S. government laboratories and organizations; and vendors of control systems. Its immediate goal is to increase the security of control systems through the definition and application of a common set of information security requirements for these systems. Initiative: Catalog of Control System Security Requirements; Description: In collaboration with DHS, NIST is developing a catalogue of requirements that provides a detailed list of security requirements to facilitate the development and convergence of cybersecurity standards applied to control systems across the industries, domestic and foreign. Initiative: NIST Industrial Control System Security Test Bed; Description: NIST initiated the development of a test bed consisting of several implementations of typical industrial control systems including SCADA, networking equipment, and relevant sensors. The test bed is being used at NIST to develop test methods for validation and conformance testing of security implementations. The test bed is also being used to help identify system vulnerabilities and to establish best practices. Source: NIST. [End of table] Other Federal Agencies Are Working with DHS, DOE, and NIST on Control Systems Security Initiatives: Environmental Protection Agency: The Environmental Protection Agency (EPA) assisted DHS in developing a control systems self-assessment tool, a software program that assists owners and operators in identifying control systems vulnerabilities and mitigation strategies for addressing these vulnerabilities. EPA began work on a water security assessment tool in response to the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, which required the agency to conduct vulnerability assessments of community water systems serving more than 3,300 individuals. EPA's preliminary work in this area served as the foundation for DHS's Control Systems Cyber Security Self Assessment Tool project. The agency initially launched the tool within the water sector in July 2007. In addition, EPA actively participates in control systems security information sharing activities through the Water Information Sharing and Analysis Center and DHS's Homeland Infrastructure Threat and Risk Analysis Center, and has been involved with control systems standards development efforts. Federal Bureau of Investigation: The Federal Bureau of Investigation's Cyber Crime division participates in DHS's US-CERT program and coordinates with DHS's National Cyber Security Division on general cybersecurity issues. According to an agency official, the Cyber Crime division is in the process of establishing a control systems work group within its Intelligence and Information Sharing group. In addition, since 1996, the bureau's cyber division has sponsored InfraGard, a cooperative government and private sector program to exchange information about infrastructure threats and vulnerabilities. As previously mentioned, SCADAGard, a special interest group within InfraGard, is to be used to share information with control systems owners and operators who have been vetted by the bureau. Nuclear Regulatory Commission: The Nuclear Regulatory Commission has conducted several activities related to enhancing the cybersecurity of control systems. The commission, which has regulatory authority over nuclear power plant safety control systems, completed a cybersecurity self-assessment project with technical assistance from the Pacific Northwest National Laboratory in October 2004 and documented the results in two technical reports published in 2004 and 2005.[Footnote 16] According to agency officials, on the basis of the information in these reports, a nuclear industry task force developed NEI 04-04, Cyber Security Program for Power Reactors, to provide nuclear power reactor licensees a means for developing and maintaining effective cybersecurity programs at their sites. In December 2005, the commission's staff accepted this document as an acceptable method for establishing and maintaining cybersecurity programs at nuclear power plants. In January 2006, the commission issued a revision to Regulatory Guide 1.152, Criteria for Use of Computers in Safety Systems of Nuclear Power Plants, which provides cybersecurity-related guidance for the design of nuclear power plant safety systems. In addition, the commission has initiated a rulemaking process providing security requirements for digital computer and communication networks, including systems that are needed for safety, security, or emergency response. The public comment period for this rulemaking closed in March 2007. According to agency officials, in May 2007, all nuclear plants had completed an inventory and assessment of their critical digital systems. Agency officials stated that the commission staff is planning to conduct oversight inspections after completion of ongoing security- related rulemaking that will clearly establish the requirements for nuclear power plant cybersecurity programs. [End of section] Appendix V: GAO Contacts and Staff Acknowledgments: GAO Contacts: David A. Powner, (202) 512-9286 or pownerd@gao.gov: Keith A. Rhodes, (202) 512-6412 or rhodesk@gao.gov: Staff Acknowledgments: In addition to those named above, Scott Borre, Heather A. Collins, Neil J. Doherty, Vijay D'Souza, Nancy Glover, Sairah Ijaz, Patrick Morton, and Colleen M. Phillips (Assistant Director) made key contributions to this report. (310841): [End of section] Footnotes: [1] The White House, The National Strategy to Secure Cyberspace (Washington, D.C.: February 2003). [2] Newton-Evans Research Company, Inc., World Market Study of SCADA, Energy Management Systems and Distribution Management Systems in Electrical Utilities: 2005-2007, (Ellicott City, Maryland: June 2005) as cited in U.S. Department of Energy, Roadmap to Secure Control Systems in the Energy Sector (Washington, D.C.: January 2006). [3] These laws and policies include, for example, the Homeland Security Act of 2002 (Pub. L. No. 107-296, sec. 214 (Nov. 25, 2002)); Homeland Security Presidential Directive 7, the Energy Policy Act of 2005 (Pub. L. No. 109-58, sec. 1211 (Aug. 8, 2005)); and The National Strategy to Secure Cyberspace. [4] The White House, The National Strategy to Secure Cyberspace (Washington, D.C.: February 2003). [5] Department of Homeland Security, National Infrastructure Protection Plan (Washington, D.C.: June 2006). [6] "Malware" (malicious software) is defined as programs that are designed to carry out annoying or harmful actions. They often masquerade as useful programs or are embedded into useful programs so that users are induced into activating them. [7] See National Institute of Standards and Technology, Special Publication 800-82 Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology, (Gaithersburg, Maryland. September 2006); Los Angeles County District Attorneys Office (da.co.la.ca.us/mr/010507a.htm), Two City Engineers Charged with Allegedly Hacking Into City's Traffic Computer (Los Angeles, California: Jan. 5, 2007); and ISA (www.isa.org/content/contentgroups/ news/2006/november29/hackers_hit_pennsylvania_water_system.htm), Hackers Hit Pennsylvania Water System, (Research Triangle Park, North Carolina: November 2,, 2006). [8] See GAO, Information Sharing: DHS Should Take Steps to Encourage More Widespread Use of Its Program to Protect and Share Critical Infrastructure Information, GAO-06-383 (Washington, DC,: Apr. 17, 2006); Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 9, 2004); and Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors, GAO-03-233 (Washington, DC.: Feb. 28, 2003). [9] See GAO, Risk Management: Further Refinements Needed to Assess Risks and Prioritize Protective Measures at Ports and Other Critical Infrastructure, GAO-06-91, (Washington, D.C.: Dec. 15, 2005). [10] GAO, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, GAO-04-354, (Washington, D.C.: Mar. 15, 2004). [11] US-CERT's mission is to protect the nation's Internet infrastructure. US-CERT coordinates defense against and responses to cyber attacks by analyzing and reducing cyber threats and vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities. [12] See GAO, Critical Infrastructure Protection: Improving Information Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July 9, 2004), and GAO-06-383. [13] Red teaming is assembling a team to attack a computer system for the purpose of identifying and reporting its vulnerabilities. [14] Five national laboratories currently participate in the National SCADA Test Bed program: Idaho National Laboratory, Sandia National Laboratories, Pacific Northwest National Laboratory, Oak Ridge National Laboratory, and Argonne National Laboratory. [15] See National Institute of Standards and Technology, Special Publication 800-82 Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology, (Gaithersburg, Maryland, September 2006). [16] U.S. Nuclear Regulatory Commission, NUREG/CR-6847: Cyber Security Self-Assessment Method for U.S. Nuclear Power Plants, (Washington D.C., October, 2004) and NUREG/CR-6852: An Examination of Cyber Security at Several U.S. Nuclear Power Plants, (Washington D.C.: May, 2005). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Susan Becker, Acting Manager, Beckers@GAO.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.