Secure By Default … No Sale

It is so disheartening. Secure By Default is a straightforward and critically important security concept. The default settings for a device or application should be secure settings so an administrator must turn off security to weaken rather than turn on security to...

Software Quality Varies in OPC Servers

The headline on this blog is hardly shocking, but software quality does not get enough attention in the control system community. We now have three strong data points that show all OPC servers are not created equal. 1. The latest is Landon’s work to verify...

OPC Vendor Security Limitation?

There’s been a delay in releasing the final paper of the three part OPC Security Whitepaper series as the paper has been going through some extensive testing. Our initial testing was with a limited amount of servers as a large amount of OPC servers exist and...

NERC v. ERO

Discussions with Joe Weiss and reading his recent blog entry have me thinking. While I don’t agree with his assessment of the value of the current CIP standards as written, he might be on to something with potential disharmony between FERC’s expectations...

Shared SCADA WAN: Enterprise, Surveillance and VoIP

A few new fronts are emerging in the battle between physical and logical separation of SCADA WAN’s. When we perform assessment and architecture projects we always ask if there are any new applications or changes expected in the near future. Increasing we hear...

When More Security Is Not The Answer

We are increasingly running into situations where asset owners are cobbling together multiple security controls to do unnecessary and risky functionality they would never consider in the past. The most common example is providing the ability to manage and configure...

Is Sloppy Use of SCADA a Problem?

I’m prepping for my podcast interview with Joe Weiss on security awareness in control systems and came across one point that didn’t make the cut, but is still interesting. Some people in the community get very upset when SCADA is used as a term to cover...

Testing RTU’s, PLC’s, IED’s etc. in Asset Owner Assessments

Assessing the security posture of an asset owner’s SCADA or DCS typically does not involve looking for new, zero-day attacks. Instead, it focuses on identifying protection against known vulnerabilities, as well as good practice configuration and implementation,...

Vivid Example for Separate Domain/Tree/Forest

Many SCADA and DCS vendors are integrating their applications with Microsoft’s Active Directory. There are some benefits to this: Control system vendors no longer need to develop and maintain user management system and other directory services (typically not a...