New ISA99 Task Group Targets Cyber Threat Gaps

In the wake of Stuxnet, the new group will aim to identify what, if any, changes are needed in the ISA99 cyber-security standards to protect industrial control systems against such sophisticated attacks.

Aw 820 1104news09

The International Society of Automation (ISA, www.isa.org) announced on March 3 that the ISA99 standards committee on Industrial Automation and Control Systems Security has formed a task group to conduct a gap analysis of the current ANSI/ISA99 standards with respect to the rapidly evolving threat landscape, as demonstrated by the highly publicized Stuxnet malware.

The purpose for the task group is to determine if companies following the ISA99 standards would have been protected from such sophisticated attacks and to identify changes needed, if any, to the standards being developed by the ISA99 committee. The new task group, designated ISA99 WG5 TG2, intends to produce a technical report summarizing the results of its analysis by mid-2011.

Short work

Formation of the task group comes following the recent publication of a White Paper by industrial security experts Eric Byres, Andrew Ginter and Joel Langill that examines how the Stuxnet malware works. That paper, titled “How Stuxnet Spreads—a Study of Infection Paths in Best Practice Systems,” determines that existing best-practice industrial security measures are insufficient against sophisticated attacks such as Stuxnet. “Not surprisingly, we learned that a worm as complex as Stuxnet will make short work of even the best of today’s ICS (industrial control system) security architectures,” Byres wrote recently on his blog. That paper is available on Byres’ company’s Web site, following registration, here.

Stuxnet is a highly sophisticated computer worm that was first disclosed in the summer of 2010. It is the first known malware to have been specifically written with the intent to compromise a control system and sabotage an industrial process. Stuxnet’s capabilities are being well documented in the press, and some of these capabilities may migrate into new threats. Going forward, automation systems must be able to detect and either block or be able to recover from advanced Stuxnet-like threats.

The ANSI/ISA99 (for American National Standards Institute) standards address the vital issue of cyber security for industrial automation and control systems. The standards describe the basic concepts and models related to cyber security, as well as the elements contained in a cyber-security management system for use in the industrial automation and control systems environment. They also provide guidance on how to meet the requirements described for each element.

Essential stop

The ANSI/ISA99 standards form the base documents for the International Electrotechnical Commission’s IEC 62443 series of industrial automation (sometimes generically labeled “SCADA,” or supervisory control and data acquisition) security standards. Over the next few years, these standards will become core international standards for protecting critical industrial infrastructures that directly impact human safety, health, and the environment, the ISA said, and they will likely will be extended to other areas of application, even broader than those generically labeled “SCADA.” Based on this, it is essential that industrial companies following IEC 62443 standards know they will be able to stop the next Stuxnet. The work of the new ISA99 task group is intended to have a significant impact on ensuring that automation facilities are secure in the future.

The new task group is open to all cyber security subject matter experts. Interested parties are asked to contact Eric Byres, at eric@byressecurity.com.

International Society of Automation
www.isa.org

More in Water / Wastewater