NIST logo

Tailoring Computer Security for Industrial Controls

From NIST Tech Beat: July 20, 2007

*
Bookmark and Share

Contact: Gail Porter
301-975-3392

Electricity, power, water, communications, waste treatment—we call the facilities that supply these services our “critical” infrastructures because they truly are critical to the health, safety and quality of everyday life. And because they are so critical, the computer systems used to control these infrastructure operations need to be rigorously protected against security breaches.

The National Institute of Standards and Technology (NIST) is soliciting public comments on a proposed expansion to its Special Publication 800-53 that provides specific requirements and guidance for protecting industrial control systems managed by federal agencies or their contractors. Produced through a partnership of NIST information technology and manufacturing engineering experts, the proposed expanded text is included in two appendices that describe how to tailor a computer security plan to an industrial control environment.

For example, certain requirements for general information security like screen locks that require the user to reenter a password after specific periods of inactivity, are impractical in some industrial control settings. Instead, compensating controls such as rigorous physical security controls, may need to be implemented to protect the system from unauthorized access at the console. Requirements for remote access monitoring or cryptography, as well as for testing of updates or patches also may need to be handled differently for industrial control systems than for general information systems.

“We produced these security strategies for federal agency use,” said NIST project leader Stuart Katzke, “however we hope that the private-sector industrial control community will consider adopting them as well.”

Under the Federal Information Security Management Act of 2002, NIST is tasked with producing computer security standards and guidelines to help federal agencies effectively protect and manage their information technology systems.

The draft appendices are available at: http://csrc.nist.gov/sec-cert/ics/draft-ics-interpretation_SP800-53.html.

NIST will accept comments on the text through Aug. 31, 2007. Comments should be forwarded to the NIST Computer Security Division, Information Technology Laboratory, 100 Bureau Drive, Mail Stop 8930, Gaithersburg, MD 20899-8930, or submitted via email to sec-ics@nist.gov.

As part of this project, NIST is planning a workshop in Knoxville, Tenn., on Aug. 16 and 17.  Information about the workshop can be obtained at: http://csrc.nist.gov/sec-cert/ics/events.html.