Tighter security over power plant computer systems urged

Current regulations to protect the control systems that support power plants nationwide fall short of federal recommendations, posing a serious threat to the electric infrastructure and national security, witnesses testified at a hearing Wednesday. One lawmaker threatened legislation if standards don't improve.

The hearing before the House Homeland Security Subcommittee on Emerging Threats, Cybersecurity and Science and Technology was prompted by a simulation that highlighted vulnerabilities in the computers that run water, power and chemical plants. In the March Aurora Generator test, researchers from the Idaho National Laboratories created a video for the Homeland Security Department simulating a cyberattack on a power plant's control system. The attack caused a generator to self-destruct.

"If this administration doesn't recognize and prioritize these problems soon, the future is not going to be pretty," said Rep. Jim Langevin, D-R.I., chairman of the subcommittee.

The government and industry experts who testified cited flaws in regulations set by the North American Electric Reliability Corporation. Certified as the electric reliability organization by the Federal Energy Regulatory Commission on July 20, 2006, NERC is charged with improving the reliability and security of the bulk power system in North America through the development and enforcement of reliability standards. Recognizing weaknesses in these standards, the National Institute of Standards and Technology released recommendations of its own for the IT security of networked digital control systems used in industrial applications.

"NERC reliability standards [are] less stringent guidelines than [those offered in the] NIST guidance," said Greg Wilshusen, director of information security issues at the Government Accountability Office. "They do not provide the level of standard, mandatory protection required."

Specifically, NERC standards focus on the bulk power system as a whole, but don't properly address the threat of regional outages or the security of the IT components that support the electric grid, Langevin said. By contrast, the System Protection Profile for Industrial Control Systems developed by NIST in collaboration with private sector organizations presents a cross-industry, baseline set of security requirements for new industrial control systems that vendors and system integrators can use. Government has not yet enforced the adoption of these requirements.

"Why [NERC] would have standards below NIST is beyond me," Langevin said. "This is something we're going to [pay] close attention to; perhaps legislation will be required."

DHS has been collaborating with electric companies to improve security measures, and the Federal Energy Regulatory Commission released standards in July 2007 that would further guard systems by mandating the creation of security plans and controls. But testimony from Greg Garcia, assistant secretary of the Office of Cybersecurity and Telecommunication at DHS, left members of the subcommittee concerned about a lack of government oversight.

"We rely on the industry sector leads to collect information on the percentage of industry that has implemented … recommendations," Garcia said, when asked about industry adoption of improved processes. He suggested that the subcommittee ask FERC for more comment.

Langevin said Homeland Security should be "more proactive to make sure that [recommended standards] are actually implemented."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.