Foreword

Why should we care about the security of industrial automation and control systems? Surely these systems are isolated, segmented, and already well protected. After all, they control manufacturing plants, oil refineries, power plants, and other elements of our critical infrastructure. We know that we can’t just casually saunter through the main entrance of a pipeline control center or power plant without the proper credentials … but without adequate automation system security controls, the virtual back door may be wide open to uninvited visitors.

It’s easy to recognize the potential for harm if industrial automation and control systems were to be manipulated by adversaries, and there are real-world scenarios that both demonstrate such capability and make it clear that there are individuals or organizations with the motive. An obvious example is the Stuxnet family of worms, which have targeted control systems including those purportedly used by Iranian organizations for uranium enrichment.

Industrial automation and control systems are a hidden but integral part of our daily lives. Their components include programmable logic controllers (PLCs), programmable automation controllers (PACs), intelligent electronic devices (IEDs), SCADA servers, and remote terminal units (RTUs), which respond with specific output signals based on the commands they receive. A simple example is a PLC that receives an input signal or command from a sensor, such as a temperature sensor on a machine in an industrial production line. When an alarm condition is detected, the output signal might shut down the machine to avoid overheating and potential damage or fire. With the widespread proliferation of computing and network technologies (e.g., high bandwidth wireless technology and broad availability of the public Internet), a natural evolution has been the development of software systems to monitor, control, and manage critical infrastructure and manufacturing systems.

So how do we figure out what the next Stuxnet, Duqu, Flame or other malicious code that targets industrial control systems might be capable of? What other threats to industrial automation and control systems exist (or may exist in the future) that our critical infrastructure might be vulnerable to, and what can we do about them?

To help answer these questions, Dr. Krutz describes the conditions that expose our critical infrastructure to network-based threats, and presents a method for identifying, prioritizing and mitigating the associated risk. Dr. Krutz seamlessly fuses his deep knowledge of information security risk management techniques with his impressive engineering experience to articulate a readily actionable approach to improving the confidentiality, integrity and availability of industrial automation and control systems through effective risk management.

This book is a compelling eye-opener for organizational leaders and a “must read” for anyone involved in the management, engineering, or operation of any aspect of our critical infrastructure.

Johnathan Coleman
Principal, Security Risk Solutions Inc.