Cloud

1/12/2017
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Ex-US National Security Official Clarke: Regulation Key To Protecting ICS/SCADA From Cyberattacks

Richard Clarke proposes a Y2K-style approach to beefing up security for critical infrastructure.

S4 CONFERENCE – Miami, Fla. – Richard Clarke, the former US National Coordinator for Security, Infrastructure Protection and Counterterrorism and White House official under three administrations, in a keynote here today proposed a Y2K-style initiative to tighten security in industrial control system (ICS) networks that would require sites to meet certain security levels by a specific date.

Clarke, who is chairman of security consulting firm Good Harbor, said this security effort would require what he described as the "dirtiest word in Washington:" regulation.

Clarke's regulation recommendation would address a major challenge faced by ICS/SCADA operators: getting the budget and resources to protect industrial control systems from damaging cyberattacks requires convincing upper management or Boards of Directors to plan for the unexpected or never-before seen incidents, Clarke said. 

"You have to persuade your bosses and policymakers that this is a problem even though it's never happened before," he said of the potential for catastrophic cyberattacks and other serious events. Clarke said it's a matter of setting a deadline for when systems must be secured: "What we need as a country to set those goal is to say industry-by industry at a certain date everything deployed has to have a security package on it. Everything deployed after this date will have to have a security package on it," for example, he explained.

It's tough to get execs to fund possible threats that their organizations haven't experienced or that haven't actually occurred yet in ICS/SCADA,  he said. "you've never really had a big cyberattack" on an ICS or SCADA system, which is the problem here, he said. "They want you to put a probablity on that. You have to resist that."

So healthcare, electric power and other ICS systems and connected automobiles would adopt this security policy approach, he said. This phased-in approach addresses the reality that ICS/SCADA systems can't be forklift-updated overnight. "[You] will have to spend money to replace all of the legacy systems … They change every 30 years or more or not," he said. "We have to do something different."

Y2K Flashback
Clarke said the market will adapt to the demands for more secure ICS/SCADA and other systems in critical industries such as healthcare and critical infrastructure.

"We have been here before. We had the Y2K problem," he said, referring to the industry-wide effort prior to Jan. 1, 2000, to update software and systems to accommodate the new century in older computer clocks. "Where we had to go back and change everything…change software … people thought then that was an ambitious goal, but we did it. And we can do it again."

Clarke says the only way to get ICS/SCADA  infrastructures protected from looming threats is to adopt a form of regulation, which he acknowledged was a tall order in the regulatory-averse political environment. "In the absence of regulation, none of this is going to happen," he said. "Regulations aren't always bad."

In the past, they've been badly written and micromanaged, he said, but they can be simpler.

"You come up with the standards and products and the beauty of that is the government is not telling you what to do and everyone has to do it so it doesn't put anyone at a competitive disadvantage," he said.

But Clarke admitted that the chances of this coming together are slim amid an anti-regulatory climate in Washington. "And given that trying to get people to prevent something that has never happened before … so I'm not optimistic. But on the other hand, it's never happened before, either … So maybe that's the thing that's never happened before" that will," he said.

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
LoriH800
50%
50%
LoriH800,
User Rank: Apprentice
1/18/2017 | 10:40:25 AM
ICS Cyber Attacks
Hi Kelly, I am curious about your starement regarding there have been not been attacks on ICS.  There have been quite a few cyber attacks on ICS's, including two incidents causing power outtages in Ukrania, the most recent (December17, 2016) was a topic of conversation at S4.  Why did you say there had been no attacks?
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1944
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-For...
CVE-2018-1945
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click act...
CVE-2018-1946
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the stronges...
CVE-2018-1947
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure withi...
CVE-2018-1948
PUBLISHED: 2019-02-21
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to...