Berlin : [etc.]|
TNO Defensie en Veiligheid
|Source:||Setola, R.Geretshuber, S., Critical Information Infrastructure Security : Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008, 190-199|
|Lecture Notes in Computer Science (LNCS)|
Safety · Process control systems · Information security · Scada · Critical infrastructure protection
International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and society. In order to understand their strengths and weaknesses, the drinking water sector in The Netherlands benchmarked the information security of their process control environments. Large differences in their security postures were found. Good Practices for SCADA security were developed based upon the study results. This paper will discuss the simple but effective approach taken to perform the benchmark, the way the results were reported to the drinking water companies, and the way in which the SCADA security good practices were developed. Figures shown in this paper are based on artificially constructed data since the study data contain company and national sensitive information.