Critical Infrastructure Protection
Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain
Gao ID: GAO-07-1036 September 10, 2007
Control systems--computer-based systems that monitor and control sensitive processes and physical functions--perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of control systems could have a significant impact on public health and safety, which makes securing them a national priority. GAO was asked to (1) determine cyber threats, vulnerabilities, and the potential impact of attacks on critical infrastructure control systems; (2) determine the challenges to securing these systems; (3) identify private sector initiatives to strengthen the cybersecurity of control systems; and (4) assess the adequacy of public sector initiatives to strengthen the cybersecurity of control systems. To address these objectives, we met with federal and private sector officials to identify risks, initiatives, and challenges. We also compared agency plans to best practices for securing critical infrastructures.
Critical infrastructure control systems face increasing risks due to cyber threats, system vulnerabilities, and the serious potential impact of attacks as demonstrated by reported incidents. Threats can be intentional or unintentional, targeted or nontargeted, and can come from a variety of sources. Control systems are more vulnerable to cyber attacks than in the past for several reasons, including their increased connectivity to other systems and the Internet. Further, as demonstrated by past attacks and incidents involving control systems, the impact on a critical infrastructure could be substantial. For example, in 2003, a computer virus was blamed for shutting down train signaling systems throughout the East Coast and in 2006, a foreign hacker was reported to have planted malicious software capable of affecting a water filtering plant's treatment operations. Critical infrastructure owners face both technical and organizational challenges to securing control systems. Technical challenges--including control systems' limited processing capabilities, real-time operations, and design constraints--hinder an infrastructure owner's ability to implement traditional information technology security processes, such as strong user authentication and patch management. Organizational challenges include difficulty in developing a compelling business case for investing in control systems security and differing priorities of information security personnel and control systems engineers. Multiple private sector entities such as trade associations and standards setting organizations are working to help secure control systems. Their efforts include developing standards, providing guidance to members, and hosting workshops on control systems security. For example, the electricity industry has recently developed standards for cybersecurity of control systems and a gas trade association is developing guidance for members to use encryption to secure control systems. Federal agencies also have multiple initiatives under way to help secure critical infrastructure control systems, but more remains to be done to coordinate these efforts and to address specific shortfalls. Over the past few years, federal agencies--including the Department of Homeland Security, the Department of Energy, and the Federal Energy Regulatory Commission (FERC)--have initiated efforts to improve the security of critical infrastructure control systems. However, there is as yet no overall strategy to coordinate the various activities across federal agencies and the private sector. Further, DHS lacks processes needed to address specific weaknesses in sharing information on control system vulnerabilities. Until public and private sector security efforts are coordinated by an overarching strategy and specific information sharing shortfalls are addressed, there is an increased risk that multiple organizations will conduct duplicative work and miss opportunities to fulfill their critical missions.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-07-1036, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain
This is the accessible text file for GAO report number GAO-07-1036
entitled 'Critical Infrastructure Protection: Multiple Efforts to
Secure Control Systems Are Under Way, but Challenges Remain' which was
released on October 17, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
United States Government Accountability Office:
GAO:
Report to Congressional Requesters:
September 2007:
Critical Infrastructure Protection:
Multiple Efforts to Secure Control Systems Are Under Way, but
Challenges Remain:
GAO-07-1036:
GAO Highlights:
Highlights of GAO-07-1036, a report to congressional requesters.
Why GAO Did This Study:
Control systems”computer-based systems that monitor and control
sensitive processes and physical functions”perform vital functions in
many of our nation‘s critical infrastructures, including electric
power, oil and gas, water treatment, and chemical production. The
disruption of control systems could have a significant impact on public
health and safety, which makes securing them a national priority. GAO
was asked to (1) determine cyber threats, vulnerabilities, and the
potential impact of attacks on critical infrastructure control systems;
(2) determine the challenges to securing these systems; (3) identify
private sector initiatives to strengthen the cybersecurity of control
systems; and (4) assess the adequacy of public sector initiatives to
strengthen the cybersecurity of control systems. To address these
objectives, we met with federal and private sector officials to
identify risks, initiatives, and challenges. We also compared agency
plans to best practices for securing critical infrastructures.
What GAO Found:
Critical infrastructure control systems face increasing risks due to
cyber threats, system vulnerabilities, and the serious potential impact
of attacks as demonstrated by reported incidents. Threats can be
intentional or unintentional, targeted or nontargeted, and can come
from a variety of sources. Control systems are more vulnerable to cyber
attacks than in the past for several reasons, including their increased
connectivity to other systems and the Internet. Further, as
demonstrated by past attacks and incidents involving control systems,
the impact on a critical infrastructure could be substantial. For
example, in 2003, a computer virus was blamed for shutting down train
signaling systems throughout the East Coast and in 2006, a foreign
hacker was reported to have planted malicious software capable of
affecting a water filtering plant‘s treatment operations.
Critical infrastructure owners face both technical and organizational
challenges to securing control systems. Technical challenges”including
control systems‘ limited processing capabilities, real-time operations,
and design constraints”hinder an infrastructure owner‘s ability to
implement traditional information technology security processes, such
as strong user authentication and patch management. Organizational
challenges include difficulty in developing a compelling business case
for investing in control systems security and differing priorities of
information security personnel and control systems engineers.
Multiple private sector entities such as trade associations and
standards setting organizations are working to help secure control
systems. Their efforts include developing standards, providing guidance
to members, and hosting workshops on control systems security. For
example, the electricity industry has recently developed standards for
cybersecurity of control systems and a gas trade association is
developing guidance for members to use encryption to secure control
systems.
Federal agencies also have multiple initiatives under way to help
secure critical infrastructure control systems, but more remains to be
done to coordinate these efforts and to address specific shortfalls.
Over the past few years, federal agencies”including the Department of
Homeland Security, the Department of Energy, and the Federal Energy
Regulatory Commission (FERC)”have initiated efforts to improve the
security of critical infrastructure control systems. However, there is
as yet no overall strategy to coordinate the various activities across
federal agencies and the private sector. Further, DHS lacks processes
needed to address specific weaknesses in sharing information on control
system vulnerabilities. Until public and private sector security
efforts are coordinated by an overarching strategy and specific
information sharing shortfalls are addressed, there is an increased
risk that multiple organizations will conduct duplicative work and miss
opportunities to fulfill their critical missions.
What GAO Recommends:
GAO is making recommendations to the Department of Homeland Security
(DHS) to develop a strategy for coordinating control systems security
efforts and to enhance information sharing with relevant stakeholders.
DHS officials did not agree or disagree with GAO‘s recommendations, but
stated that they would take them under advisement.
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Dave Powner at (202) 512-
9286 or at pownerd@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Critical Infrastructure Control Systems Face Increasing Risks Due to
Cyber Threats, Vulnerabilities, and the Potentially Serious Impact of
an Attack:
Critical Infrastructure Owners Face Technical and Organizational
Challenges to Securing Control Systems:
The Private Sector Has Multiple Initiatives Under Way to Help Secure
Control Systems:
Federal Agencies Have Multiple Initiatives to Help Secure Critical
Infrastructure Control Systems, but More Remains to Be Done:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: The Department of Homeland Security's Control Systems
Security Initiatives:
Appendix III: The Department of Energy's Initiatives to Support Control
Systems Security within the Energy Sector:
Appendix IV: Other Agencies' Initiatives to Help Secure Critical
Infrastructure Control Systems:
Appendix V: GAO Contacts and Staff Acknowledgments:
Tables:
Table 1: Critical Infrastructure Sectors and Designated Sector-Specific
Agencies:
Table 2: Sources of Cyber Threats to Critical Infrastructures:
Table 3: Comparing IT Systems to Control Systems Illustrates Security
Challenges:
Table 4: Key Control System Security Initiatives in the Electricity
Sector:
Table 5: Key Control System Security Initiatives in the Oil and Gas
Sector:
Table 6: Key Control System Security Initiatives in the Water Sector:
Table 7: Control System Security Initiatives that Affect Multiple
Sectors:
Table 8: Selected DHS Control Systems Security Initiatives:
Table 9: NIST Control Systems Security Efforts:
Figures:
Figure 1: Examples of Critical Infrastructures (clockwise from upper
left: chemical plants, nuclear power plants, hydroelectric dams, and
railroads):
Figure 2: Control Room of an Electric Power Company:
Figure 3: Major Components of a SCADA System:
Figure 4: Components of a Control System in a Water Treatment and
Distribution Facility:
Figure 5: A Substation That Is Part of Idaho National Laboratory's
Facilities for Testing Control Systems:
Figure 6: The Pacific Northwest National Laboratory's Electricity
Infrastructure Operations Center:
Abbreviations:
CIP: critical infrastructure protection:
DHS: Department of Homeland Security:
DOE: Department of Energy:
FERC: Federal Energy Regulatory Commission:
IT: information technology:
NERC: North American Electric Reliability Corporation:
NIST: National Institute of Standards and Technology:
SCADA: supervisory control and data acquisition:
US-CERT: United States Computer Emergency Readiness Team:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
September 10, 2007:
Congressional Requesters:
Control systems are computer-based systems that are used in many
industries to monitor and control sensitive processes and physical
functions. Control systems perform vital functions in many of our
nation's critical infrastructures, including electric power generation,
transmission, and distribution; oil and gas refining and pipelines;
water treatment and distribution; chemical production and processing;
railroads and mass transit; and manufacturing. Ten years ago, the
President's Commission on Critical Infrastructure Protection
highlighted the risk of cyber attacks on critical infrastructures,
stating that "the widespread and increasing use of supervisory control
and data acquisition systems for control of energy systems provides
increasing ability to cause serious damage and disruption by cyber
means."
In 2003, the National Strategy to Secure Cyberspace[Footnote 1] (often
called the cyberspace strategy) stated that the disruption of control
systems could have significant consequences for public health and
safety, and made securing these systems a national priority. The
cyberspace strategy further states that both the private and public
sectors have roles in securing control systems. The strategy directs
the Department of Homeland Security (DHS), in coordination with the
Department of Energy (DOE) and other agencies, to work in partnership
with private industry in increasing awareness of the importance of
efforts to secure control systems, developing standards, and improving
policies with respect to control systems security.
Given the importance of this issue, you asked us to (1) determine cyber
threats, vulnerabilities, and the potential impact of attacks on
critical infrastructure control systems; (2) determine the challenges
to securing critical infrastructure control systems; (3) identify
private sector initiatives to strengthen the cybersecurity of control
systems; and (4) assess the adequacy of public sector initiatives to
strengthen the cybersecurity of control systems.
To accomplish these objectives, we assessed documentation of control
system security incidents and analyzed research studies and reports, as
well as our prior reports and testimonies on control systems, critical
infrastructure protection (CIP), and national preparedness, among
others. We analyzed reports by, and met with, private sector and
federal officials who had expertise in control systems and their
security. Our work was performed from March 2007 to July 2007 in
accordance with generally accepted government auditing standards.
Appendix I contains further details on our objectives, scope, and
methodology.
Results in Brief:
Critical infrastructure control systems face increasing risks due to
cyber threats, system vulnerabilities, and the serious potential impact
of attacks as demonstrated by reported incidents. Threats can be
intentional or unintentional, targeted or nontargeted, and can come
from a variety of sources including foreign governments, criminal
groups, and disgruntled organization insiders. Control systems are more
vulnerable to cyber attacks than in the past for several reasons,
including their increased connectivity to other systems and the
Internet. Further, as demonstrated by past attacks and incidents
involving control systems, the impact on a critical infrastructure
could be substantial. For example, in 2003, a computer virus was blamed
for shutting down train signaling systems throughout the East Coast; in
2006, a foreign hacker was reported to have planted malicious software
capable of affecting a water filtering plant's water treatment
operations; and, also in 2006, excessive traffic on a nuclear power
plant's control system network--possibly caused by the failure of
another control system device--caused two circulation pumps to fail,
forcing the unit to be shut down manually.
Critical infrastructure owners face both technical and organizational
challenges to securing control systems. Technical challenges--
including control systems' limited processing capabilities, real-time
operations, and design constraints--hinder an infrastructure owner's
ability to implement traditional information technology (IT) security
processes, such as strong user authentication and patch management.
Organizational challenges include difficulty in developing a compelling
business case for investing in control systems security and differing
priorities of information security personnel and control systems
engineers.
Multiple private sector entities such as trade associations and
standards setting organizations are working to help secure control
systems. These organizations include those specific to the electric,
chemical, oil and gas, and water sectors. Their efforts include
developing standards, providing guidance to members, and hosting
workshops on control systems security. For example, the electricity
industry has recently developed standards for cybersecurity of control
systems, and a gas trade association is developing guidance for members
to use encryption to secure control systems.
Over the past few years, federal agencies--including DHS, DOE, the
National Institute of Standards and Technology (NIST), the Federal
Energy Regulatory Commission (FERC), and others--have initiated efforts
to improve the security of critical infrastructure control systems.
However, there is as yet no overall strategy to coordinate the various
control systems activities across federal agencies and the private
sector. Further, DHS lacks processes needed to address specific
weaknesses in sharing information on control system vulnerabilities.
Until public and private sector security efforts are coordinated by an
overarching strategy, there is an increased risk that multiple
organizations will conduct duplicative work and miss opportunities to
learn from other organizations' activities. In addition, until
information-sharing weaknesses are addressed, DHS risks not being able
to effectively carry out its responsibility for sharing information on
vulnerabilities with the private and public sectors.
We are making recommendations to the Secretary of the Department of
Homeland Security to develop a strategy for coordinating control
systems security efforts and to enhance information sharing with
control systems stakeholders.
DHS officials, including the Deputy Director of the National Cyber
Security Division, provided comments via e-mail on a draft of this
report, but did not agree or disagree with our recommendations.
Instead, agency officials stated that the agency would take the
recommendations under advisement. DHS officials also discussed the
agency's plans to develop a comprehensive strategy for control systems
security and efforts to develop a process for sharing sensitive
information on control system vulnerabilities. In addition, DHS
officials and others who contributed information to this report
provided technical comments, which we have incorporated in this report
as appropriate.
Background:
Critical infrastructures are physical or virtual systems and assets so
vital to the nation that their incapacitation or destruction would have
a debilitating impact on national and economic security, public health,
and safety. These systems and assets--such as the electric power grid,
chemical plants, and water treatment facilities--are essential to the
operations of the economy and the government. Recent terrorist attacks
and threats have underscored the need to protect our nation's critical
infrastructures. If vulnerabilities in these infrastructures are
exploited, our nation's critical infrastructures could be disrupted or
disabled, possibly causing loss of life, physical damage, and economic
losses.
Although the vast majority of our nation's critical infrastructures are
owned by the private sector, the federal government owns and operates
key facilities that use control systems, including oil, gas, water,
energy, and nuclear facilities (see fig. 1).
Figure 1: Examples of Critical Infrastructures (clockwise from upper
left: chemical plants, nuclear power plants, hydroelectric dams, and
railroads) (photographs):
[See PDF for image]
Sources (clockwise from upper left): Corbis, PhotoDisc, Corbis, Digital
Vision.
[End of figure]
Control Systems Are Used in Many Critical Infrastructures:
Control systems are computer-based systems that are used within many
infrastructures and industries to monitor and control sensitive
processes and physical functions. Typically, control systems collect
sensor measurements and operational data from the field, process and
display this information, and relay control commands to local or remote
equipment. Control systems perform functions that range from simple to
complex. They can be used to simply monitor processes--for example, the
environmental conditions in a small office building--or to manage the
complex activities of a municipal water system or a nuclear power
plant.
In the electric power industry, control systems can be used to manage
and control the generation, transmission, and distribution of electric
power (see fig. 2). For example, control systems can open and close
circuit breakers and set thresholds for preventive shutdowns. The oil
and gas industry uses integrated control systems to manage refining
operations at plant sites, remotely monitor the pressure and flow of
gas pipelines, and control the flow and pathways of gas transmission.
Water utilities can remotely monitor well levels and control the wells'
pumps; monitor flows, tank levels, or pressure in storage tanks;
monitor water quality characteristics such as pH, turbidity, and
chlorine residual; and control the addition of chemicals to the water.
Control systems are also used in manufacturing and chemical processing.
Chemical reactors may use control systems to produce chemicals or
regulate temperatures within the production process.
Figure 2: Control Room of an Electric Power Company (photograph):
[See PDF for image]
Source: Major electric utility.
[End of figure]
Installing and maintaining control systems requires a substantial
financial investment. DOE cites research estimating the value of the
control systems used to monitor and control the electric grid and the
oil and natural gas infrastructure at $3 billion to $4
billion.[Footnote 2] The thousands of remote field devices represent an
additional investment of $1.5 billion to $2.5 billion. Each year, the
energy sector alone spends over $200 million for control systems,
networks, equipment, and related components and at least that amount in
personnel costs.
Control Systems: Types and Components:
There are two primary types of control systems: distributed control
systems and supervisory control and data acquisition (SCADA) systems.
Distributed control systems typically are used within a single
processing or generating plant or over a small geographic area, while
SCADA systems typically are used for large, geographically dispersed
operations. For example, a utility company may use a distributed
control system to manage power generation and a SCADA system to manage
its distribution.
A SCADA system is generally composed of six components: instruments,
operating equipment, local processors, short-range communication, host
computers, and long-range communications.
* Instruments sense conditions such as pH, temperature, pressure, power
level, and flow rate.
* Operating equipment includes pumps, valves, conveyors, and substation
breakers that can be controlled by energizing actuators or relays.
* Local processors communicate with the site's instruments and
operating equipment. Local processors go by several different names,
including programmable logic controller, remote terminal unit,
intelligent electronic device, and process automation controller. A
single local processor may be responsible for dozens of inputs from
instruments and outputs to operating equipment. Local processors can
collect instrument data; turn on and off operating equipment; translate
protocols so different controllers, instruments, and equipment can
communicate; and identify alarm conditions.
* Short-range communication consists of the relatively short cables or
wireless connections that carry analog and discrete signals between the
local processors and the instruments and operating equipment. The
communication uses electrical characteristics such as voltage and
current or other established industrial communications protocols.
* Host computers are the central point of monitoring and control. The
host computer is where a human operator can supervise the process,
receive alarms, review data, and exercise control. In some cases the
host computer has logic programmed into it to provide control over the
local processors. The host computer may be called the master terminal
unit, the SCADA server, or a personal computer.
* Long-range communication consists of the communication between the
local processors and host computers. This communication typically
covers miles using methods such as leased phone lines, satellite,
microwave, and cellular packet data.
Figure 3 illustrates the major components of a SCADA system and Figure
4 illustrates how these components would be distributed in a typical
water utility.
Figure 3: Major Components of a SCADA System:
This is an illustration of the major components of a SCADA system:
* Host computers;
* Long-range communication;
* Local processors;
* Short-range communication;
* Instruments;
* Operating equipment.
Source: GAO.
[End of figure]
These components can be adapted to perform specific functions in many
industrial sectors. For example, the following graphic shows the
application of these components in a water treatment and distribution
system.
Figure 4: Components of a Control System in a Water Treatment and
Distribution Facility:
[See PDF for image]
This is an illustration of the components of a control system in a
water treatment and distribution facility:
* Reservoir;
* Central control station;
- Host computers;
- Long-range communication;
- Internet;
* Water treatment plant;
-Short-range communication;
* Pumping station;
- Operating equipment;
- Instruments;
- Local processors;
* End use.
Source: GAO.
[End of figure]
The Federal Government Plays a Critical Role in Helping Secure Critical
Infrastructures and Their Control Systems:
Federal law and policies call for critical infrastructure protection
activities to enhance the cyber and physical security of both public
and private infrastructures that are essential to national security,
national economic security, and national public health and
safety.[Footnote 3] Federal policy designates certain federal agencies
as lead points of contact for each key critical infrastructure sector
(see table 1). Further, it assigns agencies responsibility for
infrastructure protection activities in their assigned sectors and for
coordination with other relevant federal agencies, state and local
governments, and the private sector. In addition, federal policy
establishes DHS as the focal point for the security of cyberspace--
including analysis, warning, information sharing, vulnerability
reduction, mitigation, and recovery efforts for public and private
critical infrastructure information systems. To accomplish this
mission, DHS is to work with other federal agencies, state and local
governments, and the private sector.
Table 1: Critical Infrastructure Sectors and Designated Sector-Specific
Agencies:
Sector: Agriculture and food;
Sector-specific agency: Department of Agriculture, Department of Health
and Human Services, Food and Drug Administration[A].
Sector: Banking and finance;
Sector-specific agency: Department of the Treasury.
Sector: Chemical;
Sector-specific agency: Department of Homeland Security.
Sector: Commercial facilities;
Sector-specific agency: Department of Homeland Security.
Sector: Commercial nuclear reactors, materials, and waste;
Sector-specific agency: Department of Homeland Security.
Sector: Dams;
Sector-specific agency: Department of Homeland Security.
Sector: Defense industrial base;
Sector-specific agency: Department of Defense.
Sector: Drinking water and water treatment systems;
Sector-specific agency: Environmental Protection Agency.
Sector: Emergency services;
Sector-specific agency: Department of Homeland Security.
Sector: Energy;
Sector-specific agency: Department of Energy.
Sector: Government facilities;
Sector-specific agency: Department of Homeland Security.
Sector: Information technology;
Sector-specific agency: Department of Homeland Security.
Sector: National monuments and icons;
Sector-specific agency: Department of the Interior.
Sector: Postal and shipping;
Sector-specific agency: Department of Homeland Security.
Sector: Public health and health care;
Sector-specific agency: Department of Health and Human Services.
Sector: Telecommunications;
Sector-specific agency: Department of Homeland Security.
Sector: Transportation systems;
Sector-specific agency: Department of Homeland Security.
Source: The National Infrastructure Protection Plan, Homeland Security
Presidential Directive 7, and the National Strategy for Homeland
Security.
[A] The Department of Agriculture is responsible for food (including
meat, poultry, and eggs) and agriculture; and the Department of Health
and Human Services, Food and Drug Administration, is responsible for
food other than meat, poultry, and egg products.
[End of table]
Several key federal plans focus on securing critical infrastructure
control systems. The cyberspace strategy [Footnote 4] calls for DHS and
DOE to work in partnership with industry to develop best practices and
new technology to increase the security of critical infrastructure
control systems, to determine the most critical control systems-related
sites, and to develop a prioritized plan for short-term cybersecurity
improvements for those sites. In addition, DHS's National
Infrastructure Protection Plan[Footnote 5] specifically identifies
control systems as part of the cyber infrastructure, establishes an
objective of reducing vulnerabilities and minimizing severity of
attacks on these systems, and identifies programs directed at
protecting control systems. Further, in May 2007, the critical
infrastructure sectors issued sector-specific plans to supplement the
National Infrastructure Protection Plan. Twelve sectors, including the
chemical, energy, water, information technology, postal, emergency
services, and telecommunications sectors, identified control systems
within their respective sectors. Of these, most identified control
systems as critical to their sector and listed efforts under way to
help secure them.
Critical Infrastructure Control Systems Face Increasing Risks Due to
Cyber Threats, Vulnerabilities, and the Potentially Serious Impact of
an Attack:
Critical infrastructure control systems face increasing risks due to
cyber threats, system vulnerabilities, and the potentially serious
impact of an attack as demonstrated by reported incidents. Cyber
threats can be unintentional or intentional, targeted or nontargeted,
and can come from a foreign, domestic, or inside source. Control
systems can have vulnerabilities that make them susceptible to cyber
attacks, including the increased connectivity of control systems to
other systems and the Internet. Further, based on past events, the
impact of a control systems incident on a critical infrastructure could
be substantial.
Critical Infrastructures Face Multiple Cyber Threats:
Cyber threats can be unintentional and intentional, targeted or
nontargeted, and can come from a variety of sources. Unintentional
threats can be caused by software upgrades or maintenance procedures
that inadvertently disrupt systems. Intentional threats include both
targeted and nontargeted attacks. A targeted attack is when a group or
individual specifically attacks a critical infrastructure system. A
nontargeted attack occurs when the intended target of the attack is
uncertain, such as when a virus, worm, or malware[Footnote 6] is
released on the Internet with no specific target.
There is increasing concern among both government officials and
industry experts regarding the potential for a cyber attack on a
national critical infrastructure, including the infrastructure's
control systems. The Federal Bureau of Investigation has identified
multiple sources of threats to our nation's critical infrastructures,
including foreign nation states engaged in information warfare,
domestic criminals and hackers, and disgruntled employees working
within an organization. Table 2 summarizes those groups or individuals
that are considered to be key sources of threats to our nation's
infrastructures.
Table 2: Sources of Cyber Threats to Critical Infrastructures:
Threat source: Criminal groups;
Description: There is an increased use of cyber intrusions by criminal
groups that attack systems for monetary gain.
Threat source: Foreign nation states;
Description: Foreign intelligence services use cyber tools as part of
their information gathering and espionage activities. Also, several
nations are aggressively working to develop information warfare
doctrine, programs, and capabilities. Such capabilities enable a single
entity to have a significant and serious impact by disrupting the
supply, communications, and economic infrastructures that support
military power--impacts that, according to the Director of the Central
Intelligence Agency, can affect the daily lives of Americans across the
country.[A].
Threat source: Hackers;
Description: Hackers sometimes crack into networks for the thrill of
the challenge or for bragging rights in the hacker community. While
remote cracking once required a fair amount of skill or computer
knowledge, hackers can now download attack scripts and protocols from
the Internet and launch them against victim sites. Thus, attack tools
have become more sophisticated and easier to use.
Threat source: Hacktivists;
Description: Hacktivism refers to politically motivated attacks on
publicly accessible Web pages or e-mail servers. These groups and
individuals overload e-mail servers and hack into Web sites to send a
political message.
Threat source: Disgruntled insiders;
Description: The disgruntled insider, working from within an
organization, is a principal source of computer crimes. Insiders may
not need a great deal of knowledge about computer intrusions because
their knowledge of a victim system often allows them to gain
unrestricted access to cause damage to the system or to steal system
data. The insider threat also includes contractor personnel.
Threat source: Terrorists;
Description: Terrorists seek to destroy, incapacitate, or exploit
critical infrastructures to threaten national security, cause mass
casualties, weaken the U.S. economy, and damage public morale and
confidence. However, traditional terrorist adversaries of the United
States are less developed in their computer network capabilities than
other adversaries. Terrorists likely pose a limited cyber threat. The
Central Intelligence Agency believes terrorists will stay focused on
traditional attack methods, but it anticipates growing cyber threats as
a more technically competent generation enters the ranks.
Threat source: Virus writers;
Description: Virus writers are posing an increasingly serious threat.
Several destructive computer viruses and worms have harmed files and
hard drives, including the Melissa macro virus, the Explore.Zip worm,
the CIH (Chernobyl) virus, Nimda, and Code Red.
Source: Federal Bureau of Investigation, unless otherwise indicated.
[A] Prepared statement of George J. Tenet, Director of Central
Intelligence, before the Senate Select Committee on Intelligence,
February 2, 2000.
[End of table]
Control Systems Are Vulnerable to Cyber Attacks:
Control systems are vulnerable to flaws or weaknesses in system
security procedures, design, implementation, and internal controls.
When these weaknesses are accidentally triggered or intentionally
exploited, they could result in a security breach. Vulnerabilities
could occur in control systems' policies, platform (including hardware,
operating systems, and control system applications), or networks.
Federal and industry experts believe that critical infrastructure
control systems are more vulnerable today than in the past. Reasons
include the increased standardization of technologies, the increased
connectivity of control systems to other computer networks and the
Internet, insecure connections, and the widespread availability of
technical information about control systems. Further, it is not
uncommon for control systems to be configured with remote access
through either a dial-up modem or over the Internet to allow remote
maintenance or around-the-clock monitoring. If control systems are not
properly secured, individuals and organizations may eavesdrop on or
interfere with these operations from remote locations.
Reported Control Systems Incidents Reveal the Potential for Substantial
Impact:
Reported attacks and unintentional incidents involving critical
infrastructure control systems demonstrate that a serious attack could
be devastating. Although there is not a comprehensive source for
incident reporting, the following attacks, reported in government and
media sources,[Footnote 7] demonstrate the potential impact of an
attack.
* Worcester air traffic communications. In March 1997, a teenager in
Worcester, Massachusetts, disabled part of the telephone network using
a dial-up modem connected to the system. This disabled phone service to
the airport control tower, airport security, the airport fire
department, the weather service, and the carriers that use the airport.
Also, the tower's main radio transmitter and another transmitter that
activates runway lights were shut down, as well as a printer that
controllers use to monitor flight progress. The attack also disrupted
phone service to 600 homes in a nearby town.
* Maroochy Shire sewage spill. In the spring of 2000, a former employee
of an Australian organization that develops manufacturing software
applied for a job with the local government, but was rejected. Over a 2-
month period, this individual reportedly used a radio transmitter on as
many as 46 occasions to remotely break into the controls of a sewage
treatment system. He altered electronic data for particular sewerage
pumping stations and caused malfunctions in their operations,
ultimately releasing about 264,000 gallons of raw sewage into nearby
rivers and parks.
* Los Angeles traffic lights. According to several published reports,
in August 2006, two Los Angeles city employees hacked into computers
controlling the city's traffic lights and disrupted signal lights at
four intersections, causing substantial backups and delays. The attacks
were launched prior to an anticipated labor protest by the employees.
In addition, the following incidents illustrate the consequences of
nontargeted attacks and unintentional incidents on critical
infrastructure control systems. According to experts, incidents such as
these could also be triggered by a targeted attack.
* CSX train signaling system. In August 2003, the Sobig computer virus
was blamed for shutting down train signaling systems throughout the
East Coast of the United States. The virus infected the computer system
at CSX Corporation's Jacksonville, Florida, headquarters, shutting down
signaling, dispatching, and other systems. According to an Amtrak
spokesman, 10 Amtrak trains were affected. Train service was either
shut down or delayed up to 6 hours.
* Davis-Besse power plant. The Nuclear Regulatory Commission confirmed
that in January 2003, the Microsoft SQL Server worm known as Slammer
infected a private computer network at the idled Davis-Besse nuclear
power plant in Oak Harbor, Ohio, disabling a safety monitoring system
for nearly 5 hours. In addition, the plant's process computer failed,
and it took about 6 hours for it to become available again.
* Northeast power blackout. In August 2003, failure of the alarm
processor in the control system of FirstEnergy, an Ohio-based electric
utility, prevented control room operators from having adequate
situational awareness of critical operational changes to the electrical
grid. This problem was compounded when the state estimating program at
the Midwest Independent System Operator failed due to incomplete
information on the electric grid. When several key transmission lines
in northern Ohio tripped due to contact with trees, they initiated a
cascading failure of 508 generating units at 265 power plants across
eight states and a Canadian province.
* Zotob worm. In August 2005, a round of Internet worm infections
knocked 13 of Daimler Chrysler's U.S. automobile manufacturing plants
offline for almost an hour, leaving workers idle as infected Microsoft
Windows systems were patched. Zotob and its variations also caused
computer outages at heavy-equipment maker Caterpillar Inc., aircraft
maker Boeing, and several large U.S. news organizations.
* Taum Sauk Water Storage Dam failure. In December 2005, the Taum Sauk
Water Storage Dam, approximately 100 miles south of St. Louis,
Missouri, suffered a catastrophic failure, releasing a billion gallons
of water. According to the dam's operator, the incident may have
occurred because the gauges at the dam read differently than the gauges
at the dam's remote monitoring station.
* Bellingham, Washington, gasoline pipeline failure. In June 1999,
237,000 gallons of gasoline leaked from a 16-inch pipeline and ignited
an hour and a half later, causing three deaths, eight injuries, and
extensive property damage. The pipeline failure was exacerbated by
poorly performing control systems that limited the ability of the
pipeline controllers to see and react to the situation.
* Harrisburg, Pennsylvania, water system. In October 2006, a foreign
hacker penetrated security at a water filtering plant. The intruder
planted malicious software that was capable of affecting the plant's
water treatment operations. The infection occurred through the Internet
and did not seem to be an attack that directly targeted the control
system.
* Browns Ferry power plant. In August 2006, two circulation pumps at
Unit 3 of the Browns Ferry, Alabama, nuclear power plant failed,
forcing the unit to be shut down manually. The failure of the pumps was
traced to excessive traffic on the control system network, possibly
caused by the failure of another control system device.
As control systems become increasingly interconnected with other
networks and the Internet, and as the system capabilities continue to
increase, so do the threats, potential vulnerabilities, types of
attacks, and consequences of compromising these critical systems.
Critical Infrastructure Owners Face Technical and Organizational
Challenges to Securing Control Systems:
Critical infrastructure owners face both technical and organizational
challenges in securing their control systems. Technical challenges--
including control systems' limited processing capabilities and their
real-time operations--hinder infrastructure owners' ability to
implement traditional information security technologies and practices.
Organizational challenges include the lack of a compelling business
case to improve security and a reluctance to share information
regarding incidents.
Technical Challenges Hinder Use of Traditional Information Security
Measures for Control Systems:
According to industry experts, existing information security
technologies and practices--such as strong user authentication and
patch management--are generally not implemented in control systems due
to several technical issues, including limited computational processing
capabilities, the need for real-time operation, and the lack of
consideration of cybersecurity in the original design of the system.
These challenges are described here in more detail.
Limited computational capabilities. Existing security technologies--
such as authorization, authentication, encryption, intrusion detection,
and filtering of network traffic and communications--require more
bandwidth, processing power, and memory than control system components
typically have. Controller stations are generally designed to do
specific tasks, and they often use low-cost, resource-constrained
microprocessors. In addition, passwords and other data from control
systems are often transmitted in a plain, unencrypted format.
Encrypting this data could overload the processing abilities of the
control system.
Need for real-time operations. Complex passwords and other strong
password practices are not always used to prevent unauthorized access
to control systems, in part because they could hinder the operator's
ability to respond rapidly during an emergency. As a result, according
to security experts, weak passwords that are easy to guess, and shared
and infrequently changed, are common in control systems. Some even use
default passwords or no password at all.
Design limitations. Historically, control systems vendors did not
design their products with security in mind, although recently vendors
have begun including more security-related features in their products.
In addition, although modern control systems are based on standard
operating systems, they are typically customized to support control
system applications. Consequently, software patches may either be
incompatible with the customized version of the operating system or
difficult to implement without compromising service by shutting down
"always-on" systems or affecting interdependent operations.
Table 3 illustrates the technical challenges in securing control
systems by contrasting them with conventional information technology
(IT) systems.
Table 3: Comparing IT Systems to Control Systems Illustrates Security
Challenges:
System characteristic: Performance requirements;
Information technology system:
* Generally not real time;
* Response must be consistent;
* High throughput is demanded;
* Delay may be acceptable;
Control system:
* Real time;
* Response is time critical;
* Modest throughput is acceptable;
* Delay is a serious concern;
Security challenge for control systems: Real-time operations: The
security solution should not delay system response time.
System characteristic: Availability requirements;
Information technology system:
* Responses such as rebooting are acceptable;
* Availability deficiencies can often be tolerated, depending on the
system's operational requirements;
Control system:
* Responses such as rebooting may not be acceptable because of process
availability requirements;
* Outages must be planned and scheduled days/weeks in advance;
* High availability requires exhaustive predeployment testing;
Security challenge for control systems: Design limitations: The
security solution should not require rebooting or cause unplanned
outages.
System characteristic: Risk management requirements;
Information technology system:
* Data confidentiality and integrity are paramount;
* Fault tolerance is less important-momentary downtime is not a major
risk;
* Major risk impact is delay of business operations;
Control system:
* Human safety is paramount, followed by protection of the process;
* Fault tolerance is essential: even momentary downtime is not
acceptable;
* Major risk impact is regulatory noncompliance or loss of life,
equipment, or production;
Security challenge for control systems: Design limitations: The
security solution should not impose unacceptable risk by endangering
lives or affecting the process being controlled; the security solution
should not cause downtime.
System characteristic: Time-critical interaction;
Information technology system:
* Less critical emergency interaction;
* Tightly restricted access control can be implemented to the degree
necessary;
Control system:
* Response to human and other emergency interaction is critical;
* Access to control system should be strictly controlled, yet not
hamper human-machine interaction;
Security challenge for control systems: Real-time operations: Increased
security of stringent access controls must be balanced against the need
for fast response times in emergencies.
System characteristic: System operation;
Information technology system:
* Systems are designed for use with typical operating systems;
* Upgrades are straightforward with the availability of automated
deployment tools;
Control system:
* Differing and custom operating systems often do not have security
capabilities;
* Software changes must be carefully made, usually by software vendors,
because of the specialized control algorithms and perhaps modified
hardware and software involved;
Security challenge for control systems: Design limitation: Additional
testing and modification of off-the-shelf products may be required;
additional time may be required for vendors to implement upgrades.
System characteristic: Resource constraints;
Information technology system:
* Systems are specified with enough resources to support the addition
of third party applications such as security solutions;
Control system:
* Systems are designed to support the intended industrial process, with
minimal memory and computing resources to support the addition of
security technology;
Security challenge for control systems: Processing capabilities: It is
more difficult to add additional security technology or processes to
control systems.
System characteristic: Communications;
Information technology system:
* Standard communications protocols;
* Primarily wired networks with some localized wireless capabilities;
* Typical IT networking practices;
Control system:
* Many proprietary and standard communication protocols;
* Several types of communications media used including dedicated wire
and wireless (radio and satellite);
* Networks are complex and sometimes require the expertise of control
engineers;
Security challenge for control systems: Design limitation: Standard IT
solutions may not operate on control system networks.
System characteristic: Change management;
Information technology system:
* Software changes are applied in a timely fashion in the presence of
good security policies and procedures. The procedures are often
automated;
Control system:
* Software changes must be thoroughly tested and deployed incrementally
throughout a system to ensure that the integrity of the control system
is maintained;
* Control system outages often must be planned and scheduled days/weeks
in advance;
Security challenge for control systems: Real-time operations:
Additional planning, testing, and slower deployment are required when
implementing security solutions.
System characteristic: Managed support;
Information technology system:
* Allow for diversified support methods;
Control system:
* Service support is usually via a single vendor;
Security challenge for control systems: Design limitations: Solutions
may be limited to those provided or supported by vendor.
System characteristic: Component lifetime;
Information technology system:
* Lifetime on the order of 3-5 years;
Control system:
* Lifetime on the order of 15-20 years;
Security challenge for control systems: Design limitation: Security
solution should not become obsolete quickly.
System characteristic: Access to components;
Information technology system:
* Components are usually local and easy to access;
Control system:
* Components can be isolated, remote, and require extensive physical
effort to gain access to them;
Security challenge for control systems: Design limitation: Additional
time and effort required to access network components.
Source: GAO analysis of NIST, Guide to Supervisory Control and Data
Acquisition (SCADA) and Industrial Control Systems Security, Special
Publication 800-82 (Initial Public Draft).
[End of table]
Organizational Issues Pose Challenges to Securing Control Systems:
In addition to the technical challenges of securing control systems,
critical infrastructure owners face organizational challenges in
securing control systems, including difficulty in developing a
compelling business case for improving control systems security, a
reluctance to share information on control system incidents (which
could help build a business case), and the division of technical
responsibilities within an organization.
Experts and industry representatives reported that organizations may be
reluctant to devote resources to securing control systems. These
resources include money, personnel, training, and the early replacement
of equipment that may have been originally designed to last 20 years or
more. Until industry users of control systems have a business case to
justify why additional security is needed, there may be little market
incentive for the private sector to develop and implement more secure
control systems.
Another challenge is the reluctance to share information on control
systems incidents and the resulting lack of attention to this risk.
While incidents and attacks on critical infrastructure control systems
have occurred, to date there is no authoritative, centralized process
for collecting and analyzing information about control systems
incidents. Experts we interviewed stated that companies are reluctant
to share details of incidents due to factors such as legal liability
and impact on their reputation. Several experts stated that they
believed incidents were occurring, but are not being reported by
industry. One expert suggested that since there have been no reports of
significant disruptions caused by cyber attacks on U.S. control
systems, industry representatives may believe the threat of such an
attack is low. We have previously recommended that the government work
with the private sector to improve the quality and quantity of
information being shared among industries and government about attacks
on the nation's critical infrastructures.[Footnote 8]
Another challenge involves the way security responsibilities are
structured within organizations that use control systems. Several
experts and industry representatives stated that two separate groups
often have responsibility for securing control systems: (1) IT security
personnel and (2) control system engineers and operators. IT security
personnel focus on securing enterprise systems, while control system
engineers and operators focus on the reliable performance of their
control systems. Because each has a different focus, the two groups
face challenges in collaborating to implement secure control systems.
For example, IT security personnel may be unaware of the special
requirements of a control system and the control systems personnel may
be unaware of the full range of security technologies that may be
available.
Certain challenges are inherent to control systems. However, according
to experts, many of these challenges can be addressed by both the
private and public sectors through proper implementation of existing
technology, development of new technologies, and implementation of
organizational policies and procedures and training.
The Private Sector Has Multiple Initiatives Under Way to Help Secure
Control Systems:
Industry-specific organizations in various sectors, including the
electricity, chemical, oil and gas, and water sectors, have initiatives
under way to help improve control system security. These initiatives
include developing standards, publishing guidance, and hosting
workshops.
Electricity:
The electricity system of the United States and Canada has more than $1
trillion in asset value, more than 200,000 miles of transmission lines,
and more than 800,000 megawatts of generating capability serving over
300 million people. The effective functioning of this infrastructure is
highly dependent on control systems. As a result, private sector
organizations in the electricity sector have several activities under
way related to control systems security, including establishing
mandatory reliability standards, developing guidelines for compliance
with these standards, hosting workshops, and other activities. See
table 4 for a description of key control systems security initiatives
in the electricity sector.
Table 4: Key Control System Security Initiatives in the Electricity
Sector:
Organization: North American Electric Reliability Corporation (NERC);
NERC's mission is to ensure that the major transmission components of
the electric system in North America are reliable, adequate, and
secure. It is a self-regulatory organization that sets standards for
the reliable operation and planning of the major transmission
components of the electric system and monitors, assesses, and enforces
compliance with those standards.
Initiative: NERC promotes the development of a new mandatory system of
reliability standards, authorized by the Federal Energy Regulatory
Commission. The standards are meant to apply to systems such as control
systems that, if compromised, could cause a threat to the large-scale
power distribution system. The Energy Policy Act of 2005 established a
process through which NERC is authorized to enforce compliance with
these reliability standards.[A] NERC began implementing cybersecurity
reliability standards that apply to control systems in June 2007.
Electric utilities must be fully compliant with the standards by 2010.
Organization: Electric Power Research Institute;
The institute is an independent nonprofit center for energy and
environmental research. It brings together members, participants, the
institute's scientists and engineers, and other experts to work on
solutions to the challenges of electric power. Its members represent
over 90 percent of the electricity generated in the United States.
Initiative: The institute has released guidelines on control systems
security, including a report in 2003 and another in 2005. A recent
institute report, Compliance Guidelines for Cyber Security Reliability
Standards-2006 Update, provides information, recommendations, and tools
to help the electric power industry comply with the mandatory NERC
cybersecurity reliability standards. The institute is currently
developing a tool to help asset managers create better business cases
for control system security technology. According to a manager of the
institute's CIP efforts, the institute also:
* has a forum that meets about three times per year during which its
members discuss cybersecurity incidents, including those related to
control systems;
* performs research on policies and procedures for securing control
systems, but has not been able to develop security technology for
control systems given current funding levels (the institute's security
research has included various reviews of SCADA systems, determining how
to secure certain products that are being used by the electric power
industry, reviewing how a facility could recognize and recover from a
control systems attack, and studying the use of wireless technology for
SCADA systems and the inherent security risks); and;
* has worked on control systems-related projects with the national
laboratories, and has collaborated with DOE. For example, in 2006, the
institute worked with the Pacific Northwest National Laboratory to
identify the risks and vulnerabilities associated with using broadband
communications for control systems and to develop mitigation
strategies. According to a laboratory official, the institute and the
laboratory are currently working on a project on electric power
utilities' use of wireless technologies. The project is to produce two
papers addressing best practices for wireless deployment in the
electric sector, and guidelines for securing wireless networks,
training personnel, and securely integrating wireless and wired
networks.
Organization: Institute of Electrical and Electronics Engineers;
The institute is responsible for developing international standards for
telecommunications, IT, and power generation products and services.
Initiative: The Institute of Electrical and Electronics Engineers has
several working groups that address issues related to control systems
security in the electric power industry. Some of these work groups are
developing standards for defining, specifying, and analyzing control
systems. For example, the institute is developing P1689, a standard for
retrofitting cybersecurity to various communications links in a control
system, and P1711, a cryptographic standard for the same links. The
institute is also developing P1686, which will define the functions and
features to be provided in substation intelligent electronic devices to
accommodate critical infrastructure protection programs.
Organization: International Electrotechnical Commission;
The commission prepares and publishes international standards for all
electrical, electronic, and related technologies. World Trade
Organization agreements permit use of these standards in international
trade.
Initiative: The commission's Technical Committee 57 is working to
develop standards for control systems and control system components of
power transmission and distribution systems, including communications
and end devices called remote terminal units. It is also establishing
data and communications security and communications standards for
substations. The commission's Technical Committee 65 is chartered to
produce standards in the area of industrial process measurement and
control. Working Group 10 of the committee is developing commission
standard 62443, which is a three-part standard that will address
network and system cybersecurity of industrial process measurement and
control systems.
Source: GAO analysis of information provided by North America Electric
Reliability Corporation, interviews with Federal Energy Regulatory
Commission officials, Electric Power Research Institute, Institute of
Electrical and Electronics Engineers, and the International
Electrotechnical Commission.
[A] Pub. L. No. 109-58, sec. 1211 (Aug. 8, 2005), 16 U.S.C. § 824o
(2006).
[End of table]
Chemical:
Control systems are used to monitor and control processes within the
chemical industry. A $460 billion critical infrastructure sector, the
chemical industry contributes nearly 3 percent of the U.S. gross
domestic product and generates 6.2 million jobs. Chemical reactors may
use control systems to produce chemicals or regulate temperatures
within the production process.
The American Chemistry Council is a trade association that represents
major companies in the U.S. chemical manufacturing sector. The council
supports research and initiatives related to federal regulation on
health, safety, security, and the environment.
The council established a Chemical Sector Cyber Security Program in
2002 to facilitate implementation of the Chemical Sector Cyber Security
Strategy. Updated in 2006, the strategy, as well as the Guidance for
Addressing Cyber Security in the Chemical Industry, addresses
manufacturing and control system security efforts and guidance on how
to secure these systems. Further, within the cybersecurity program, the
Manufacturing and Control Systems Security Work Team was developed to
collect, identify, and facilitate the use of practices for securing
manufacturing and control systems and to establish a network of
manufacturing and control systems subject matter experts.
Oil and Gas:
The United States has more than 2 million miles of pipelines delivering
oil and natural gas. In 2005, the consumption of natural gas totaled
about 22,000 billion cubic feet, and in the United States, 20,802,000
barrels of petroleum were consumed per day. Both the gas and oil
industries use control systems for process management and monitoring
purposes. Employing integrated control systems, these industries can
control the refining operations at a plant site, remotely monitor the
pressure and flow of gas pipelines, and control the flow and pathways
of gas transmissions. The sector-specific plan for the energy sector
(which includes oil and gas) includes a discussion of selected control
systems security efforts within the sector. The oil and gas sector has
multiple control systems security activities under way, in particular,
standards relating to security of control systems. See table 6 for a
description of key control systems security efforts in the oil and gas
sector.
Table 5: Key Control System Security Initiatives in the Oil and Gas
Sector:
Organization: American Gas Association;
A trade organization that advocates for local natural gas utility
companies and provides a broad range of programs and services for
member natural gas pipelines, marketers, international gas companies,
and industry associates.
Initiative: The American Gas Association's Automation and
Telecommunication and Gas Control committees supported the development
of a report that would recommend how to apply encryption to protect gas
utility control systems. A task group was organized to develop Standard
AGA Report No.12, Cryptographic Protection of SCADA Communications,
which consists of four parts. The first part, Background, Policies, and
Test Plan, published in March 2006, is intended to serve as a guideline
for voluntary implementation of a comprehensive cybersecurity posture.
This report sets up the risk assessment process and allows owners and
operators to determine if encryption is a good security practice for
their control systems. The second part, Retrofit Link Encryption for
Asynchronous Serial Communications, has not yet been finalized. This
part contains functional requirements and details technical
specifications for AGA-12 compliant retrofit devices used in control
systems. Both the third and fourth parts have not yet been developed.
The third part, Protection of Networked Systems, is to focus on high-
speed communication systems for control systems, including the
Internet. The final part, Protection Embedded in SCADA Components, is
to focus on protecting control systems by incorporating cryptography
into system components at the time of manufacture. The second, third,
and fourth parts of this report are expected to be developed under the
leadership and technical expertise of the Gas Technology Institute with
user input from the membership of the American Gas Association.
Organization: American Petroleum Institute;
A national trade association for America's oil and natural gas
industry. The institute's corporate members include various segments of
the oil industry, such as producers, refiners, suppliers, pipeline
operators and marine transporters, as well as service and supply
companies that support all segments of the industry;
Initiative: The institute published standard 1164, Pipeline SCADA
Security, in September 2004. This standard provides guidance to the
operators of oil and gas liquid pipeline systems for managing critical
infrastructure control systems integrity and security. This guideline
is specifically designed to provide the operators with a description of
industry practices in critical infrastructure control systems security
and to provide the framework needed to develop sound security practices
within the operator's individual companies. The institute published
standard 1165, Recommended Practice for Pipeline SCADA Displays, in
January 2007. This recommended practice focuses on the design and
implementation of displays used for displaying, monitoring, and
controlling information on pipeline control systems.
Source: GAO analysis of information provided by American Gas
Association, Interview with Department of Energy officials, American
Petroleum Institute.
[End of table]
Water:
The water sector includes drinking water and water treatment systems.
The sector's infrastructures are diverse, complex, and distributed,
ranging from systems that serve a few customers to those that serve
millions. The sector includes about 150,000 water, wastewater, and
storm water organizations; federal water offices at the national,
regional, and state levels belonging to several agencies; some 100
state water agency organizations; and many other local government water
organizations. Members of the water sector have worked with the
Environmental Protection Agency on development of the Water Sector-
Specific Plan, which includes some efforts on control systems security.
Members of the water sector are also participating in the Process
Control Security Forum's activities. See table 7 for a list of key
control system security initiatives by various organizations in the
water sector.
Table 6: Key Control System Security Initiatives in the Water Sector:
Organization: Awwa Research Foundation;
An international nonprofit organization that sponsors research to
enable water utilities, public health agencies, and other professionals
to provide safe and affordable drinking water to consumers.
Initiative: The foundation is currently working on two research
projects. The first is the Cryptographic Protection of SCADA
Communications for Water Systems #2969, which will develop a standard
suite of equations and protocols to provide cybersecurity for water
utility SCADA systems. The second, which is in collaboration with DHS,
is the Control Systems Cyber Security Self Assessment Tool #3045, which
is to identify, organize, prioritize, and describe the most probable
electronic security threats; risks associated with vulnerabilities,
available prevention technology, best practices, and critical areas of
uncertainty. In 2002, the foundation developed a vulnerability
assessment methodology for large drinking water utilities to assist
them in meeting federally mandated vulnerability assessments. Now that
deadlines for vulnerability assessments have passed, utilities may
still use the methodology to develop emergency response plans. The
methodology has also been adapted for use at small and medium-sized
utilities.
Organization: Association of Metropolitan Water Agencies;
An organization of the largest publicly owned drinking water systems in
the United States. The association collects and exchanges management,
security, legislative, and technical information to support competitive
utility operations, effective utility leadership, safe and secure water
supplies, and effective public communication on drinking water quality.
Initiative: The association served as the U.S. EPA-designated liaison
between the water sector and the federal government on critical
infrastructure protection and currently operates the Water Information
Sharing and Analysis Center and the Water Security Channel. The Water
Information Sharing and Analysis Center offers a secure database,
expert analysis, information gathering, and the rapid distribution of
reports and government alerts about threats to America's drinking water
and wastewater utilities, including control systems. The center went
online in December 2002. The Water Security Channel is a free service
of the center designed to disseminate security information to the
broadest wastewater and drinking water community, including information
about control systems security issues. Members of the association have
held workshops, events, formed committees, and written papers that deal
with cyber and control systems security.
Source: American Water Works Association, Association of Metropolitan
Water Agencies.
[End of table]
Other Organizations:
Other organizations are working on efforts to improve control systems
security that are not sector-specific. The organization formerly known
as the Instrumentation, Systems, and Automation Society, and now called
ISA, is currently working on control systems security efforts, and
InfraGard, a nonprofit organization associated with the Federal Bureau
of Investigation, has recently started a control systems-related
effort. See table 8 for a description of these initiatives.
Table 7: Control System Security Initiatives that Affect Multiple
Sectors:
Organization: ISA (formerly the Instrumentation, Systems, and
Automation Society);
The society develops standards, certifies industry professionals,
provides education and training, and publishes books and technical
articles.
Initiative: The society's industrial automation and control systems'
Security Standards Committee is composed of representatives from many
industries, including water/wastewater, fossil fuels, nuclear energy,
food and beverages, pharmaceuticals, chemicals, petrochemicals, U.S.
government labs and organizations, and automotive and educational
institutions. The committee intends to establish standards, recommend
practices, and develop technical reports and related information that
will define procedures for implementing electronically secure
industrial automation and control systems and security practices and
assess electronic security performance. The committee has finished two
technical reports. One report documents the current state of
cybersecurity technologies as they are applied to the control systems
environment to clearly define what can reasonably be deployed today and
to define areas where more research is needed. A second report presents
an approach for developing, implementing, and operating a program that
addresses security for control systems. The committee is currently
working on a standard to establish and operate an industrial automation
and control systems security program and specific security requirements
for industrial automation and control systems. The first part deals
with terminology and has been approved by the society. The second part
deals with establishing a security program and is currently awaiting
approval by the committee. The third part deals with operating the
program and has not been started. The fourth part deals with technical
security requirements and was started in October 2006. The committee
has also recently started a related working group on patch management.
Organization: InfraGard/SCADAGard;
InfraGard is a nonprofit organization associated with the Federal
Bureau of Investigation. The program consists of 86 regional chapters
with representatives from the public and private sectors. The program
focuses on activities related to critical infrastructure protection and
cyber crime.
Initiative: InfraGard recently established a SCADAGard special interest
group. According to the head of the group, the group will be used to
share control systems security information with InfraGard members who
are control systems vendors, owners, and operators and have previously
been vetted by the Federal Bureau of Investigation.
Source: GAO analysis of information provided by ISA and InfraGard.
[End of table]
Federal Agencies Have Multiple Initiatives to Help Secure Critical
Infrastructure Control Systems, but More Remains to Be Done:
Over the past few years, federal agencies--including DHS, DOE, NIST,
FERC, and others--have initiated efforts to improve the security of
critical infrastructure control systems. However, DHS has not yet
established a strategy to coordinate the various control systems
activities across federal agencies and the private sector. Further,
more can be done to address specific weaknesses in DHS's ability to
share information on control systems vulnerabilities. Until DHS
develops an overarching strategy, there is an increased risk that the
federal government and private sector will invest in duplicative
initiatives and miss opportunities to learn from other organization's
activities. Further, until DHS addresses specific weaknesses in sharing
information, there is an increased risk that the agency will not be
able to effectively carry out its responsibility for sharing
information on vulnerabilities, and that there could be a disruption to
our nation's critical infrastructures.
Federal Agencies Have Many Initiatives Under Way, but DHS Lacks a
Comprehensive Strategy that Delineates Responsibilities and Coordinates
Activities:
There are many federal efforts under way to help improve the security
of critical infrastructure control systems. For example, DHS is
sponsoring multiple control systems security initiatives across
critical infrastructure sectors, including a program to improve control
systems cybersecurity that includes vulnerability reporting and
response, activities to promote security awareness within the control
systems community, and efforts to build relationships with control
systems vendors and infrastructure asset owners. See appendix II for a
detailed description of DHS's key initiatives and projects involving
control systems security.
Additionally, DOE sponsors control systems security efforts within the
electric, oil, and natural gas industries. These efforts include the
National SCADA Test Bed Program, which funds testing, assessments, and
training in control systems security and the development of a road map
for securing control systems in the energy sector. Also, several of
DOE's national laboratories play an important role in implementing many
DHS and DOE efforts and provide support directly to asset owners and
vendors. For example, the national laboratories perform site
assessments, test vendor equipment, and conduct outreach and awareness
activities for infrastructure asset owners and vendors. See appendix
III for more information on DOE's initiatives.
Other federal agencies, such as NIST and FERC, have also undertaken
efforts to help secure control systems. For example, NIST is working
with federal and industry stakeholders to develop standards,
guidelines, checklists, and test methods to help secure critical
control systems, while FERC is working to implement electricity
reliability standards that address control systems. See appendix IV for
more information on these and other initiatives.
Several industry experts we spoke with stated that many federal
programs in control systems security have been helpful. For example,
experts stated that developing the road map was a positive step for the
energy sector. An official who participated in the development of DOE's
road map stated that the process succeeded in identifying industry
needs and was a catalyst for bringing agencies and government
coordinating councils together and that it was a good idea for other
industries to develop plans similar to the road map. In addition,
experts we interviewed said the testing and site assessments conducted
by the national laboratories for DHS and DOE made individual products
more secure and helped improve overall attention to control systems
security.
However, the federal government does not yet have an overall strategy
for guiding and coordinating control systems security efforts across
the multiple agencies and sectors. To evaluate activities related to
critical infrastructure protection, we developed a risk management
framework for protecting critical infrastructures based on the
standards and practices of leading organizations.[Footnote 9] The first
phase of this framework is the development of a strategy that includes
the goals, objectives, constraints, specific activities, milestones,
and performance measures needed to achieve a particular end result. In
2004, we reported that federal agencies, standards organizations, and
the private sector were leading various initiatives on control systems
security, but lacked coordination and oversight to effectively improve
the cybersecurity of the nation's control systems.[Footnote 10] We
recommended that DHS develop and implement a strategy for coordinating
control systems security efforts among government agencies and the
private sector.
DHS agreed with our recommendation to develop a control systems
security strategy and, in 2004, issued a strategy that focuses
primarily on DHS's initiatives. However, the strategy does not include
ongoing work by DOE, FERC, NIST, and others. Further, it does not
include the various agencies' responsibilities, goals, milestones, or
performance measures. Agency officials stated they have convened a
federal working group that will develop a list of control systems
security activities across the government. Further, in commenting on a
draft of this report, DHS officials stated that this baseline list of
activities will serve as the foundation for a comprehensive strategy
across the public and private sectors. However, they did not provide a
date for when the baseline and the comprehensive strategy would be
completed. In addition, they did not state whether the list or the
strategy would include responsibilities, goals, milestones, or
performance measures.
Until DHS develops an overarching strategy that delineates various
public and private entities' roles and responsibilities and uses it to
guide and coordinate control systems security activities, the federal
government and private sector risk investing in duplicative activities
and missing opportunities to learn from other organization's
activities.
DHS Faces Challenges in Sharing Sensitive Information on Control
Systems Vulnerabilities:
DHS is responsible for sharing information with critical infrastructure
owners on control systems vulnerabilities, but faces challenges in
doing so. In 2006, DHS developed a formal process for managing control
systems vulnerabilities reported to the U.S. Computer Emergency
Readiness Team (US-CERT).[Footnote 11] DHS gathers this information and
works with vendors and others to identify mitigation strategies. It
then releases this information to critical infrastructure owners and
operators, control systems vendors, and the public.
However, DHS's sharing of sensitive information on control systems to
date has been limited. As of June 2007, US-CERT has issued only nine
notices related to control systems security since the inception of the
control systems security program in 2003. DHS's information sharing is
limited in part because of reluctance by those in the private sector to
inform the agency of vulnerabilities they have identified and in part
because of weaknesses in DHS's ability to disseminate potentially
sensitive information to the private sector. We previously reported on
difficulties DHS has had in collecting information from, and sharing it
with, the private sector.[Footnote 12] Industry officials stated that
they are reluctant to share information about incidents because of
uncertainties about how the information will be used and the value of
reporting such incidents.
In addition, DHS lacks a rapid, efficient process for disseminating
sensitive information to private industry owners and operators of
critical infrastructures. An agency official noted that sharing
information with the private sector can be slowed by staff turnover and
vacancies at DHS, the need to brief agency and executive branch
officials and congressional staff before briefing the private sector,
and difficulties in determining the appropriate classification level
for the information. DHS's control systems security program manager
acknowledged the need to share information more quickly. In commenting
on a draft of this report, DHS officials stated that after the start of
our review, the agency began developing a process to formalize and
improve information sharing. However, this process was not evident
during our review. Further, DHS did not provide evidence of this
process or examples of how the process had actually been used to share
information.
Until DHS establishes an approach for rapidly assessing the sensitivity
of vulnerability information and disseminating it--and thereby
demonstrates the value it can provide to critical infrastructure
owners--the agency's ability to effectively serve as a focal point in
the collection and dissemination of sensitive vulnerability information
will continue to be limited. Without a trusted focal point for sharing
sensitive information on vulnerabilities, there is an increased risk
that attacks on control systems could cause a significant disruption to
our nation's critical infrastructures.
Conclusions:
Control systems are an essential component of our nation's critical
infrastructure. Past incidents involving control systems, system
vulnerabilities, and growing threats from a wide variety of sources
highlight the risk facing these systems. The public and private sectors
have begun numerous activities to improve the cybersecurity of these
systems. However, the federal government lacks an overall strategy for
coordinating public and private sector efforts. DHS also lacks an
efficient process for sharing sensitive information on vulnerabilities
with private sector critical infrastructure owners. Until an
overarching strategy is in place, public and private sectors risk
undertaking duplicative efforts. Also, without a streamlined process
for advising private sector infrastructure owners of vulnerabilities,
DHS is unable to fulfill its responsibility as a focal point for
disseminating this information. If key vulnerability information is not
in the hands of those who can mitigate its potentially severe
consequences, there is an increased risk that attacks on control
systems could cause a significant disruption to our nation's critical
infrastructures.
Recommendations for Executive Action:
To improve federal government efforts to secure control systems
governing critical infrastructure, we recommend that the Secretary of
the Department of Homeland Security implement the following two
actions:
* develop a strategy to guide efforts for securing control systems,
including agencies' responsibilities, as well as overall goals,
milestones, and performance measures, and:
* establish a rapid and secure process for sharing sensitive control
system vulnerability information with critical infrastructure control
system stakeholders, including vendors, owners, and operators.
Agency Comments and Our Evaluation:
We received comments via e-mail on a draft of this report from DHS
officials, including the Deputy Director of the National Cyber Security
Division. In the comments, agency officials neither agreed nor
disagreed with our recommendations. Instead, they stated that DHS would
take the recommendations under advisement. Additionally, officials
stated that the agency has recently begun working with its partners in
the Federal Control System Security Working Group to establish a
baseline of ongoing activities. This baseline is to serve as a
foundation for developing a comprehensive strategy that will encompass
the public and private sectors, set a vision to secure control systems,
describe roles and responsibilities, and identify future requirements
for resources and action. Moreover, officials stated that the agency
has recently developed a process to formalize the sharing of sensitive
information related to control systems vulnerabilities. The officials
reported that this process describes the information flow from
vulnerability discovery, to validation, public and private
coordination, and outreach and awareness. Further, it identifies the
deliverables and outcomes expected at each step in the process.
While DHS's intention to develop a comprehensive public/private
strategy is consistent with our recommendation, the agency did not
provide a date by which this strategy will be completed. Until DHS
completes the comprehensive strategy, the public and private sectors
risk undertaking duplicative efforts.
Additionally, while DHS officials stated that the agency had developed
a process for sharing sensitive information on control system
vulnerabilities, it did not have such a process in place during our
review. Further, the agency has not provided evidence of its process
for sharing control system vulnerability information or evidence that
this process has been used to share information. Until such a process
is formalized and implemented, key vulnerability information may not be
available to those who can mitigate its potentially severe
consequences, therefore increasing the risk that attacks on control
systems could cause a significant disruption to our nation's critical
infrastructures.
DHS officials and officials from other agencies who contributed to this
report provided technical comments, which we have incorporated as
appropriate.
As agreed with your offices, unless you publicly announce the contents
of this report earlier, we plan no further distribution of it until 30
days from the report date. At that time, we will send copies of this
report to interested congressional committees, the Secretary of the
Department of Homeland Security, and other interested parties. In
addition, this report will be available at no charge on GAO's Web site
at [hyperlink, http://www.gao.gov].
If you have any questions on matters discussed in this report, please
contact Dave Powner at (202) 512-9286 or Keith Rhodes at (202) 512-
6412, or by e-mail at pownerd@gao.gov and rhodesk@gao.gov. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. GAO staff who made major
contributions to this report are listed in appendix V.
Signed by:
David A. Powner:
Director:
Information Technology Management Issues:
Signed by:
Keith A. Rhodes:
Chief Technologist Director:
Center for Technology and Engineering:
List of Requesters:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Susan M. Collins:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable James R. Langevin:
Chairman:
The Honorable Michael T. McCaul:
Ranking Member:
Subcommittee on Emerging Threats, Cybersecurity, and Science and
Technology:
Committee on Homeland Security:
House of Representatives:
The Honorable Sheila Jackson-Lee:
Chairwoman:
The Honorable Daniel L. Lungren:
Ranking Member:
Subcommittee on Transportation Security and Infrastructure Protection:
Committee on Homeland Security:
House of Representatives:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to (1) determine cyber threats, vulnerabilities,
and the potential impact of attacks on critical infrastructure control
systems; (2) determine the challenges to securing critical
infrastructure control systems; (3) identify private sector initiatives
to strengthen the cybersecurity of control systems; and (4) assess the
adequacy of public sector initiatives to strengthen the cybersecurity
of control systems.
To determine the cyber threats, vulnerabilities, and the potential
impact of attacks on critical infrastructure control systems, we
reviewed prior GAO reports on control systems as well as reports
prepared by other government agencies and private organizations,
including documentation of prior control system security incidents. We
conducted interviews with individuals in the private sector, including
representatives of private companies that operate control systems.
These individuals were selected based on their knowledge of and
participation in both private and public sector control system security
activities. We also met with representatives from trade associations
and federal agencies. On the basis of the information and documentation
we received from these individuals, and information we collected during
site visits to three of the national laboratories, we were able to
compile information on the cyber threats, vulnerabilities, and the
potential impact of attacks on critical infrastructure control systems.
To determine the challenges to securing critical infrastructure control
systems, we reviewed prior GAO reports and testimonies and materials
written by other public and private organizations on control systems
security, critical infrastructure protection, and national
preparedness. We conducted interviews with experts and industry
representatives, including managers of federal control systems programs
at the Department of Homeland Security (DHS) and Department of Energy
(DOE), experts from the national laboratories, vendors, owners and
operators, and standards and trade associations.
To identify the private sector initiatives to strengthen cybersecurity
of control systems, we researched current standards and accepted trade
practices and analyzed current efforts to better secure control
systems. We spoke to private sector owners and operators, vendors,
trade associations, industry experts, and standards associations. These
organizations included the North American Electric Reliability
Corporation (NERC), the American Gas Association, and ISA.
To assess the adequacy of public sector initiatives to strengthen the
cybersecurity of control systems, we researched relevant federal laws
and regulations and initiatives by federal agencies to better secure
control systems, and reviewed documentation and project plans on
federal control systems efforts. We also reviewed GAO's prior work
analyzing best practices from leading organizations and interviewed
private sector and other experts in control systems security for their
perspectives on federal efforts. We interviewed officials from federal
agencies including DHS, DOE, the National Institute of Standards and
Technology (NIST), and the Federal Energy Regulatory Commission (FERC).
In addition, we visited three of the national laboratories that are
leading control systems security research and outreach efforts. These
labs were selected because of their extensive participation in DOE and
DHS control systems security programs. We then compared the activities
of federal agencies with best practices and the perspectives of
experts.
Our work was conducted from March 2007 to July 2007 at agencies'
headquarters in Washington, D.C., and at national laboratories in
Idaho, New Mexico, and Washington state in accordance with generally
accepted government auditing standards.
[End of section]
Appendix II: The Department of Homeland Security's Control Systems
Security Initiatives:
DHS supports multiple control systems security initiatives across
government and the private sector. Table 9 lists key initiatives and
projects conducted by DHS in control system security.
Table 8: Selected DHS Control Systems Security Initiatives:
Initiative: Coordination with US-CERT;
Description: DHS's control systems program is working to enhance
management of control system incidents and provide timely situational
awareness information to control systems owners and operators through
coordination with the United States Computer Emergency Readiness Team
(US-CERT). According to agency officials, a person from the program
works in the US-CERT operations center and handles any incoming threats
or vulnerabilities related to control systems. The Idaho National
Laboratory provides backup technical support if needed. DHS also
provides outreach and awareness on the role of US-CERT in reporting and
mitigating control systems cyber vulnerabilities, and is developing the
capability to analyze software harmful to control systems.
Initiative: Control System Cyber Security Self Assessment Tool;
Description: DHS has developed the Control Systems Cyber Security Self
Assessment Tool to assist control systems owners and operators in
evaluating vulnerabilities and recommending mitigation strategies. This
software takes users through a series of questions to determine the
current status of their control systems network. It includes specific
control systems architectures recommended by the National Institute of
Standards and Technology as examples for end users and uses existing
standards and recommended practices to provide the user a set of
requirements for addressing specific security measures. The software
was piloted in 2006 in several critical infrastructure sectors, and was
deployed to the water sector in June 2007. According to agency
officials, the software has also been tested in the electric sector and
oil and gas sectors. According to DHS officials, in the future, the
department plans to turn over development and maintenance of the
software to a commercial vendor.
Initiative: Process Control System Forum;
Description: In February 2005, DHS launched the first Process Control
System Forum. The forum is primarily a means for the government to
reach out to academia, vendors, and owners and operators of critical
infrastructure. In March 2007, the forum was held in Atlanta, Georgia,
and included approximately 200 attendees.
Initiative: Cyber Security Procurement Language for Control Systems;
Description: The Cyber Security Procurement Language for Control
Systems project is an initiative that DHS sponsored together with Idaho
National Laboratory, the Multi-State Information Sharing and Analysis
Center, and private industry. The purpose of the project is to
summarize security principles that should be considered when designing
and procuring control systems products and provide examples of language
to incorporate into procurement specifications. According to an
industry expert, the language has been used by owners procuring new
control systems equipment. NIST officials stated that they are
considering integrating this project into the Control System Cyber
Security Self Assessment Tool (see previous section), by identifying
the procurement language that would be necessary to address an
identified vulnerability. In January 2007 the National Infrastructure
Advisory Council[A] issued a report recommending that the Office of
Management and Budget mandate that federal agencies apply the
procurement language when procuring control systems and services.
Initiative: Catalog of Control System Security Requirements;
Description: DHS is also in the process of developing a Catalog of
Control System Security Requirements. This initiative will provide a
catalog of recommended requirements to facilitate the development and
implementation of control systems cybersecurity standards to be applied
to critical infrastructure. DHS and NIST officials stated that this
will provide a common terminology that can be used for standards
development and can therefore promote collaboration or convergence of
industry standards. The catalog was used by NIST during the development
of control systems- related guidance and, according to agency
officials, was sent to ISA, a standards association, and the
International Electrotechnical Commission for consideration. The
catalog is currently in draft form.
Initiative: Monthly Vendor Phone Calls;
Description: DHS hosts monthly teleconference meetings with control
systems vendors to provide a forum for the vendors to share information
and common concerns, and to discuss control systems security needs for
legacy and next generation products. According to agency officials,
approximately 30 vendors representing most of the sectors using control
systems are participating in the calls. At the most recent Process
Control System Forum conference, the vendors held their first face-to-
face meeting. The DHS Control System Security Program Director stated
that approximately 90 percent of the control systems manufacturers in
the United States were represented at this meeting.
Initiative: Federal Control Systems Working Group;
Description: This group represents the federal control systems
community and it is currently working on development of a baseline of
federal control systems security efforts and enhancing information
sharing with relevant stakeholders.
Initiative: National Laboratory Assessments and Training;
Description: DHS funds initiatives at DOE laboratory facilities
including control systems site and vendor assessments and training. For
more information, see appendix III.
Initiative: Institute for Information Infrastructure Protection;
Description: In January 2002, the Institute for Information
Infrastructure Protection, a consortium made up of 27 entities managed
by Dartmouth College, began operation. In 2005, the institute launched
the Process Control Systems Security Research Project. This project
focuses on cybersecurity-related research in the oil and gas sector.
Initiatives completed include a source code checking tool, an intrusion
detection and event correlation tool for process control systems, and a
tool for building a business case for investing in security. According
to program officials, currently there are two main bodies of work: (1)
work that is drawing to a close from $8.5 million in funding from DHS's
Science and Technology Directorate and (2) a new body of work that
received $4.1 million in funding from DHS's National Cyber Security
Division. Institute officials stated that the new work is under way as
of April 2007, and will also focus on solutions for survivability and
recovery of process control systems in the oil, gas, and chemical
industries.
Initiative: Linking the Oil and Gas Industry to Improve Cyber Security;
Description: The Linking the Oil and Gas Industry to Improve Cyber
Security project was a cooperative initiative between DHS's Science and
Technology Directorate and companies in the oil and gas industry that
ran from July 2005 to June 2006. The program's purpose was to identify
new technologies for protecting process control systems. The program
included a 14-member consortium of private sector oil and gas
companies. DHS officials stated that the project was a precompetitive
research and development project, and therefore the agency was able to
provide support to begin the project and will likely play a role in the
technology transfer process. The consortium of companies selected six
vendor products to be included in the project. The consortium worked
with Sandia National Laboratories on integrating and testing the six
products, which resulted in a potentially viable security solution. The
integrated solution was demonstrated to the participating organizations
at a wrap-up meeting in Houston, Texas, on September 11, 2006.
Initiative: Small Business Innovation Research Awards;
Description: According to agency officials, from 2004 to 2005 DHS's
Science and Technology Directorate funded 13 research proposals related
to control systems security. The proposals received individual awards
of up to $100,000 and lasted no more than 6 months in duration. On the
basis of the results of these proposals, DHS awarded five small
business innovation research awards. These awards were up to $750,000
and typically were for no more than 2 years in duration. The last of
these awards was completed in February 2007. Agency officials stated
that oil and gas owners and operators have shown particular interest in
continuing work on intrusion detection, encryption, and authentication
of users.
Initiative: Chemical Facilities Security Standards;
Description: The 2007 DHS Appropriations Act required that DHS issue
interim final regulations establishing security standards for chemical
facilities. The regulations require vulnerability assessments and the
development and implementation of site security plans for these
facilities, and DHS must audit and inspect the facilities. DHS issued
the regulations in April 2007, explicitly extending their applicability
to control systems.
Initiative: Pipeline Control Systems Safety;
Description: The Transportation Security Administration's Pipeline
Security Division conducts a corporate security review process for
major pipeline operators that includes a high-level review of control
systems security. As of June 2007, the division has conducted
approximately 65 reviews. In addition, the administration is working on
a pilot project involving assessments of security policies and control
systems security for a particular pipeline operator.
Source: GAO analysis of information provided by DHS and the Institute
for Information Infrastructure Protection.
[A] The National Infrastructure Advisory Council was chartered on July
1, 2005 to provide the President, through the Secretary of the
Department of Homeland Security, with advice on the security of the
critical infrastructure sectors and their information systems.
[End of table]
[End of section]
Appendix III: The Department of Energy's Initiatives to Support Control
Systems Security within the Energy Sector:
Since 2003, the Department of Energy's Office of Electricity Delivery
and Energy Reliability has led control systems security efforts within
the electric, oil, and natural gas industries by establishing the
National SCADA Test Bed Program and developing a 10-year strategic
framework for securing control systems in the energy sector. DOE's
national laboratory facilities also play an important role in control
systems security research. In particular, the Idaho National
Laboratory, Sandia National Laboratories, and the Pacific Northwest
National Laboratory lead key efforts in control systems security
research for DOE, DHS, and other public and private organizations.
The National SCADA Test Bed Program:
In 2004, DOE launched the National SCADA Test Bed Program, a
multilaboratory effort to identify control systems vulnerabilities,
conduct control systems research and development, and provide
cybersecurity training and outreach to industry. The test bed program
includes five DOE laboratories and has a budget of $10 million for
fiscal year 2007. To date, the test bed program has completed 12
control systems vulnerability assessments in cooperation with control
systems vendors and energy sector owners and operators. As a result of
these assessments, the test bed team has provided vendors with
recommendations to improve control systems security, and owners and
operators with strategies for mitigating existing system security
risks. The test bed program also has 10 ongoing control systems
research and development projects that are peer-reviewed biannually to
ensure they meet the needs of the government and the end users. In
addition to its testing and research efforts, the program has led
training workshops on control systems security for over 1,500 industry
personnel, and has established a working group to evaluate control
systems security standards in the energy sector.
Strategic Framework for Securing Control Systems in the Energy Sector:
In January 2006, DOE released the Roadmap to Secure Control Systems in
the Energy Sector, a collaborative public-private strategy for securing
control systems infrastructures over the next 10 years. Developed
jointly by energy owners and operators, researchers, vendors, and the
government, the road map links near-, mid-, and long-term security
needs with four main goals: (1) measure and assess the current security
posture; (2) develop and integrate protective measures; (3) detect
intrusion and implement response strategies; and (4) sustain security
improvements.
The road map outlines the energy sector's top control systems security
concerns and existing mitigation efforts, and is serving as a model for
other sectors to develop similar plans. For example, in January 2007,
DHS's National Infrastructure Advisory Council recommended that DHS and
the sector-specific agencies develop plans using DOE's road map as a
model. DOE has used the road map to align its test bed projects with
strategic goals. In addition, DOE has created an online road map that
uses the strategic framework to track public and private sector control
systems security projects.
National Laboratories Are Leading Significant Portions of Control
Systems Security Work:
DOE owns 17 laboratories and research facilities around the country
that play an important role in control systems security research. In
particular, the Idaho National Laboratory, the Sandia National
Laboratories, and the Pacific Northwest National Laboratory manage and
conduct key efforts in control systems security research for DOE, DHS,
and other public and private organizations. Using their research
facilities, the laboratories are able to conduct work for DHS, DOE, and
other organizations.
Research Facilities:
The laboratories are able to use a number of unique research facilities
to test control systems equipment. For example, Idaho National
Laboratory operates its own electrical power transmission facility,
which consists of 61 miles of high-voltage transmission lines, feeders,
transformers, and independent substations (see fig. 5). According to
laboratory officials, because portions of the transmission facility are
easy to separate from the overall power grid, control systems equipment
can be tested on the grid without fear of effects on the larger power
grid.
[End of section]
Figure 5: A Substation That Is Part of Idaho National Laboratory's
Facilities for Testing Control Systems (photograph):
[See PDF for image]
[End of figure]
The Pacific Northwest National Laboratory has the Electricity
Infrastructure Operations Center, which is a replica of a typical
operations center used in the electric industry, with consoles,
displays, hardware, and software that can be used for control of
electricity transmission (see fig. 6). The center receives live
transmission data from actual utility control systems, and is used as a
platform for research, development, and demonstration.
[End of section]
Figure 6: The Pacific Northwest National Laboratory's Electricity
Infrastructure Operations Center (photograph):
[See PDF for image]
[End of figure]
DHS Sponsors Laboratory Activities Involving Control Systems Security:
The national laboratories manage key efforts for DHS related to control
systems security. For example, the Idaho National Laboratory is the
lead laboratory to support and execute the DHS Control Systems Security
Program. According to laboratory officials, the laboratories coordinate
activities funded through DHS with those funded through the National
SCADA Test Bed of the Department of Energy. For example, Idaho National
Laboratory has conducted five vendor assessments and six site
assessments using DHS funds and eight vendor assessments and four site
assessments using DOE funds.
Additionally, the Idaho, Pacific Northwest, and Sandia National
Laboratories developed training for asset owners and operators. The
Idaho National Laboratory has developed 4-and 8-hour classes on control
systems security that it has given to approximately 1,500 industry
personnel since 2005. In 2006, the Pacific Northwest National
Laboratory developed online control systems security awareness training
that has been published on US-CERT's Web site. In 2007, Sandia National
Laboratories developed training to educate owners and operators on how
to effectively use red teaming to improve the security posture of their
control systems.[Footnote 13] Further, the Idaho National Laboratory
has worked with George Mason University and New York University to
develop a draft master's level course curriculum on critical
infrastructure and control systems security.
DOE's National SCADA Test Bed Sponsors Laboratory Activities:
Under DOE's National SCADA Test Bed Program, the national laboratories
have worked both independently and collaboratively on performing vendor
vulnerability assessments, conducting control systems research and
development, and leading industry training and outreach.[Footnote 14]
For example, between 2004 and 2007, the Idaho National Laboratory
conducted assessments of eight different control systems for the
electricity sector. According to laboratory officials, vendors provide
the lab with the hardware, software, and training necessary to run the
control system; this represents a $1 million to $1.5 million investment
by the vendor. Largely on the basis of the results of these
assessments, vendors have chosen to develop system patches, reconfigure
system architectures, and build enhanced systems, which have been
retested by the laboratory. Furthermore, according to an agency
official, the results of the vendor assessments have helped inform
other federal control systems efforts, such as the development of the
control system self assessment tool. In addition, the Idaho National
Laboratory has conducted four on-site control system assessments for
electricity sector owners and operators.
In addition to vendor assessments, the laboratories are engaged in 10
research projects that are to help industry stakeholders analyze
control systems operations and improve the security and reliability of
architectures for control systems. For example, the Pacific Northwest
National Laboratory has developed a technology to encapsulate control
systems communications between two devices with a unique identifier and
authenticator. This technology enables the devices to verify that the
communication has not been tampered with. Unlike comparable
technologies for standard information technology (IT) systems, the
authentication technology does not require substantial amounts of
bandwidth or processing power. Importantly, this technology has the
potential to be applied to both new systems and older control systems.
In addition, the Idaho, Pacific Northwest, and Sandia National
Laboratories are working on identifying vulnerabilities in the current
communications protocol used between control centers, testing
mitigation techniques, and, ultimately, assisting industry in
implementing a secure version of the protocol.
Other Organizations Sponsor Laboratory Activities:
In addition to work for DHS and DOE, the laboratories have conducted
control systems security work for other public and private
organizations, including research, security assessments, and training.
For example, the laboratories have performed security assessments of
control systems for federal operators of critical infrastructure,
including the Bureau of Reclamation, Tennessee Valley Authority,
Bonneville Power Administration, and the Strategic Petroleum Reserve,
as well as private sector utility companies. Moreover, the Pacific
Northwest National Laboratory worked with the Nuclear Regulatory
Commission and the Nuclear Energy Institute to develop a self-
assessment methodology for nuclear plants to determine compliance with
standards.
[End of section]
Appendix IV: Other Agencies' Initiatives to Help Secure Critical
Infrastructure Control Systems:
In addition to DHS and DOE, multiple other federal agencies and
entities are working to help secure critical infrastructure control
systems. Initiatives undertaken by the Federal Energy Regulatory
Commission, the National Institute of Standards and Technology, the
Environmental Protection Agency, and others are described here.
Federal Energy Regulatory Commission:
Under the Energy Policy Act of 2005, the Federal Energy Regulatory
Commission (FERC) was authorized to (1) appoint an electricity
reliability organization to develop and enforce mandatory electricity
reliability standards, including cybersecurity, and (2) approve,
remand, or require modification to each proposed standard. The agency
may also direct the reliability organization to develop a new standard
or modify existing standards. Both the agency and the reliability
organization have the authority to enforce approved standards,
investigate incidents, and impose penalties (up to $1 million a day) on
noncompliant electricity asset users, owners, or operators.
FERC has conducted several activities to begin implementing the
requirements of the act. In July 2006, FERC certified the North
American Electric Reliability Corporation (NERC) as the electric
reliability organization. In December 2006, FERC released a staff
assessment of NERC's eight Critical Infrastructure Protection (CIP)
reliability standards, which include standards for control systems
security. FERC found that while the standards were a good start, there
were a number of items that required improvement, including ambiguous
language for standards requirements, measurability, and degrees of
compliance; insufficient technical requirements to ensure grid
reliability; and the use of "fill-in-the-blank standards," which are
not enforceable. NERC agreed that the standards represented a starting
point and has proposed a work plan to address the deficiencies. In July
2007, FERC issued a notice of public rulemaking in which it proposed to
approve eight CIP reliability standards while directing NERC to modify
the areas of these standards that require improvement. After
considering public comments on the notice of public rulemaking, which
are due in late September 2007, FERC plans to issue its final rule on
the CIP reliability standards.
The National Institute of Standards and Technology Is Developing
Standards and Guidance to Improve Control Systems Security:
The National Institute of Standards and Technology (NIST) is working
with federal and industry stakeholders to develop standards,
guidelines, checklists, and test methods to help secure critical
control systems. For example, NIST is currently developing guidance for
federal agencies that own or operate control systems to comply with
federal information system security standards and guidelines.[Footnote
15] The guidance identifies issues and modifications to consider in
applying information security standards and guidelines to control
systems. Table 10 lists key NIST efforts.
Table 9: NIST Control Systems Security Efforts:
Initiative: Industrial Control Systems Security Project;
Description: The project intends to build on current federal security
standards and provide targeted extensions and/or interpretations of
those standards for industrial and process control systems where
needed.
Initiative: Special Publication 800-53, Recommended Security Controls
for Federal Information Systems, Revision 1 --Appendix I: Industrial
Control Systems: Interim Guidance on the Application of Security
Controls;
Description: NIST is currently working on applying Special Publication
(SP) 800-53, Recommended Security Controls for Federal Information
Systems, to control systems. NIST SP 800-53 was originally developed
for the traditional IT environment, and it treats control systems as
information systems. However, organizations have had difficulties in
using SP 800-53 to protect their control systems due to the unique
needs of control systems. Through the results of NIST workshops held in
April 2006 and March 2007, NIST developed and, in July 2007, released
an augmentation to SP 800-53 that addresses control systems. According
to agency officials, while most controls in SP 800-53 are applicable to
control systems as written, several controls do require supplemental
guidance and enhancements. NIST officials stated they plan to hold a
workshop in late summer 2007, to include representatives from national
and international control systems communities to share information,
obtain input, and determine their level of interest in voluntarily
adopting and using NIST's industrial control system interpretation of
SP 800-53.
Initiative: Special Publication 800-82, Guide to Supervisory Control
and Data Acquisition (SCADA) and Industrial Control Systems Security;
Description: NIST is developing Special Publication 800-82, Guide to
Supervisory Control and Data Acquisition (SCADA) and Industrial Control
Systems Security. The publication is a guidance document on how to
secure control systems, including the security of legacy systems. An
initial public draft was released in September 2006, and the
publication is due for second public draft release in August 2007.
Initiative: NIST Special Publication 1058, Using Host-Based Antivirus
Software on Industrial Control Systems: Integration Guidance and a Test
Methodology for Assessing Performance Impacts;
Description: NIST and Sandia National Laboratories, under the guidance
and sponsorship of DOE's Office of Electricity Delivery and Energy
Reliability and its National SCADA Test Bed Program, investigated and
tested the impacts of commercial, off-the-shelf antivirus software on
control system performance. A guidance document was released in
September 2006.
Initiative: Process Controls Security Requirements Forum;
Description: NIST organized the Process Controls Security Requirements
Forum to establish security specifications that can be used in the
procurement, development, and retrofit of industrial control systems.
The forum's membership includes representatives from the water,
electric, chemical, and petrochemical industries; U.S. government
laboratories and organizations; and vendors of control systems. Its
immediate goal is to increase the security of control systems through
the definition and application of a common set of information security
requirements for these systems.
Initiative: Catalog of Control System Security Requirements;
Description: In collaboration with DHS, NIST is developing a catalogue
of requirements that provides a detailed list of security requirements
to facilitate the development and convergence of cybersecurity
standards applied to control systems across the industries, domestic
and foreign.
Initiative: NIST Industrial Control System Security Test Bed;
Description: NIST initiated the development of a test bed consisting of
several implementations of typical industrial control systems including
SCADA, networking equipment, and relevant sensors. The test bed is
being used at NIST to develop test methods for validation and
conformance testing of security implementations. The test bed is also
being used to help identify system vulnerabilities and to establish
best practices.
Source: NIST.
[End of table]
Other Federal Agencies Are Working with DHS, DOE, and NIST on Control
Systems Security Initiatives:
Environmental Protection Agency:
The Environmental Protection Agency (EPA) assisted DHS in developing a
control systems self-assessment tool, a software program that assists
owners and operators in identifying control systems vulnerabilities and
mitigation strategies for addressing these vulnerabilities. EPA began
work on a water security assessment tool in response to the Public
Health Security and Bioterrorism Preparedness and Response Act of 2002,
which required the agency to conduct vulnerability assessments of
community water systems serving more than 3,300 individuals. EPA's
preliminary work in this area served as the foundation for DHS's
Control Systems Cyber Security Self Assessment Tool project. The agency
initially launched the tool within the water sector in July 2007.
In addition, EPA actively participates in control systems security
information sharing activities through the Water Information Sharing
and Analysis Center and DHS's Homeland Infrastructure Threat and Risk
Analysis Center, and has been involved with control systems standards
development efforts.
Federal Bureau of Investigation:
The Federal Bureau of Investigation's Cyber Crime division participates
in DHS's US-CERT program and coordinates with DHS's National Cyber
Security Division on general cybersecurity issues. According to an
agency official, the Cyber Crime division is in the process of
establishing a control systems work group within its Intelligence and
Information Sharing group.
In addition, since 1996, the bureau's cyber division has sponsored
InfraGard, a cooperative government and private sector program to
exchange information about infrastructure threats and vulnerabilities.
As previously mentioned, SCADAGard, a special interest group within
InfraGard, is to be used to share information with control systems
owners and operators who have been vetted by the bureau.
Nuclear Regulatory Commission:
The Nuclear Regulatory Commission has conducted several activities
related to enhancing the cybersecurity of control systems. The
commission, which has regulatory authority over nuclear power plant
safety control systems, completed a cybersecurity self-assessment
project with technical assistance from the Pacific Northwest National
Laboratory in October 2004 and documented the results in two technical
reports published in 2004 and 2005.[Footnote 16] According to agency
officials, on the basis of the information in these reports, a nuclear
industry task force developed NEI 04-04, Cyber Security Program for
Power Reactors, to provide nuclear power reactor licensees a means for
developing and maintaining effective cybersecurity programs at their
sites. In December 2005, the commission's staff accepted this document
as an acceptable method for establishing and maintaining cybersecurity
programs at nuclear power plants.
In January 2006, the commission issued a revision to Regulatory Guide
1.152, Criteria for Use of Computers in Safety Systems of Nuclear Power
Plants, which provides cybersecurity-related guidance for the design of
nuclear power plant safety systems. In addition, the commission has
initiated a rulemaking process providing security requirements for
digital computer and communication networks, including systems that are
needed for safety, security, or emergency response. The public comment
period for this rulemaking closed in March 2007.
According to agency officials, in May 2007, all nuclear plants had
completed an inventory and assessment of their critical digital
systems. Agency officials stated that the commission staff is planning
to conduct oversight inspections after completion of ongoing security-
related rulemaking that will clearly establish the requirements for
nuclear power plant cybersecurity programs.
[End of section]
Appendix V: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
David A. Powner, (202) 512-9286 or pownerd@gao.gov:
Keith A. Rhodes, (202) 512-6412 or rhodesk@gao.gov:
Staff Acknowledgments:
In addition to those named above, Scott Borre, Heather A. Collins, Neil
J. Doherty, Vijay D'Souza, Nancy Glover, Sairah Ijaz, Patrick Morton,
and Colleen M. Phillips (Assistant Director) made key contributions to
this report.
(310841):
[End of section]
Footnotes:
[1] The White House, The National Strategy to Secure Cyberspace
(Washington, D.C.: February 2003).
[2] Newton-Evans Research Company, Inc., World Market Study of SCADA,
Energy Management Systems and Distribution Management Systems in
Electrical Utilities: 2005-2007, (Ellicott City, Maryland: June 2005)
as cited in U.S. Department of Energy, Roadmap to Secure Control
Systems in the Energy Sector (Washington, D.C.: January 2006).
[3] These laws and policies include, for example, the Homeland Security
Act of 2002 (Pub. L. No. 107-296, sec. 214 (Nov. 25, 2002)); Homeland
Security Presidential Directive 7, the Energy Policy Act of 2005 (Pub.
L. No. 109-58, sec. 1211 (Aug. 8, 2005)); and The National Strategy to
Secure Cyberspace.
[4] The White House, The National Strategy to Secure Cyberspace
(Washington, D.C.: February 2003).
[5] Department of Homeland Security, National Infrastructure Protection
Plan (Washington, D.C.: June 2006).
[6] "Malware" (malicious software) is defined as programs that are
designed to carry out annoying or harmful actions. They often
masquerade as useful programs or are embedded into useful programs so
that users are induced into activating them.
[7] See National Institute of Standards and Technology, Special
Publication 800-82 Guide to Supervisory Control and Data Acquisition
(SCADA) and Industrial Control Systems Security: Recommendations of the
National Institute of Standards and Technology, (Gaithersburg,
Maryland. September 2006); Los Angeles County District Attorneys Office
(da.co.la.ca.us/mr/010507a.htm), Two City Engineers Charged with
Allegedly Hacking Into City's Traffic Computer (Los Angeles,
California: Jan. 5, 2007); and ISA (www.isa.org/content/contentgroups/
news/2006/november29/hackers_hit_pennsylvania_water_system.htm),
Hackers Hit Pennsylvania Water System, (Research Triangle Park, North
Carolina: November 2,, 2006).
[8] See GAO, Information Sharing: DHS Should Take Steps to Encourage
More Widespread Use of Its Program to Protect and Share Critical
Infrastructure Information, GAO-06-383 (Washington, DC,: Apr. 17,
2006); Critical Infrastructure Protection: Improving Information
Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July
9, 2004); and Critical Infrastructure Protection: Challenges for
Selected Agencies and Industry Sectors, GAO-03-233 (Washington, DC.:
Feb. 28, 2003).
[9] See GAO, Risk Management: Further Refinements Needed to Assess
Risks and Prioritize Protective Measures at Ports and Other Critical
Infrastructure, GAO-06-91, (Washington, D.C.: Dec. 15, 2005).
[10] GAO, Critical Infrastructure Protection: Challenges and Efforts to
Secure Control Systems, GAO-04-354, (Washington, D.C.: Mar. 15, 2004).
[11] US-CERT's mission is to protect the nation's Internet
infrastructure. US-CERT coordinates defense against and responses to
cyber attacks by analyzing and reducing cyber threats and
vulnerabilities, disseminating cyber threat warning information, and
coordinating incident response activities.
[12] See GAO, Critical Infrastructure Protection: Improving Information
Sharing with Infrastructure Sectors, GAO-04-780 (Washington, D.C.: July
9, 2004), and GAO-06-383.
[13] Red teaming is assembling a team to attack a computer system for
the purpose of identifying and reporting its vulnerabilities.
[14] Five national laboratories currently participate in the National
SCADA Test Bed program: Idaho National Laboratory, Sandia National
Laboratories, Pacific Northwest National Laboratory, Oak Ridge National
Laboratory, and Argonne National Laboratory.
[15] See National Institute of Standards and Technology, Special
Publication 800-82 Guide to Supervisory Control and Data Acquisition
(SCADA) and Industrial Control Systems Security: Recommendations of the
National Institute of Standards and Technology, (Gaithersburg,
Maryland, September 2006).
[16] U.S. Nuclear Regulatory Commission, NUREG/CR-6847: Cyber Security
Self-Assessment Method for U.S. Nuclear Power Plants, (Washington D.C.,
October, 2004) and NUREG/CR-6852: An Examination of Cyber Security at
Several U.S. Nuclear Power Plants, (Washington D.C.: May, 2005).
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Susan Becker, Acting Manager, Beckers@GAO.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: