Recommended Practice for Patch Management of Control Systems
Abstract
A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.
- Authors:
- Publication Date:
- Research Org.:
- Idaho National Laboratory (INL)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 944885
- Report Number(s):
- INL/EXT-08-14740
TRN: US200902%%1143
- DOE Contract Number:
- DE-AC07-99ID-13727
- Resource Type:
- Technical Report
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 42 ENGINEERING; COMMUNICATIONS; CONTROL SYSTEMS; DATA ACQUISITION; ELECTRIC POWER; FUNCTIONALS; MANAGEMENT; PETROLEUM; PROCESS CONTROL; SECURITY; TRANSPORTATION SYSTEMS; WATER; control system; patch management; recommended practice
Citation Formats
Steven Tom, Dale Christiansen, and Dan Berrett. Recommended Practice for Patch Management of Control Systems. United States: N. p., 2008.
Web. doi:10.2172/944885.
Steven Tom, Dale Christiansen, & Dan Berrett. Recommended Practice for Patch Management of Control Systems. United States. doi:10.2172/944885.
Steven Tom, Dale Christiansen, and Dan Berrett. Mon .
"Recommended Practice for Patch Management of Control Systems". United States.
doi:10.2172/944885. https://www.osti.gov/servlets/purl/944885.
@article{osti_944885,
title = {Recommended Practice for Patch Management of Control Systems},
author = {Steven Tom and Dale Christiansen and Dan Berrett},
abstractNote = {A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.},
doi = {10.2172/944885},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon Dec 01 00:00:00 EST 2008},
month = {Mon Dec 01 00:00:00 EST 2008}
}
-
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore »
-
Recommended Practice for Securing Control System Modems
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. -
THE HAE PROCESS FOR MAGNESIUM: RECOMMENDED PRACTICE-INSTALLATION, OPERATION AND CONTROL DETAILS PHYSICAL CHARACTERISTICS OF THE HAE COATING. Third Revi sed Edition
A summary of the technique of magnesium alloy preparation and treatment by the HAE process is presented. The equipment necessary for the installation of the process is described, as well as the operating procedure and bath control. coating characteristics are given, and an outline of recent process development is discussed. Military specification for coating magnesium alloy is included as well as data on the process and methods of bath analysis. (J.R.D.) -
Recommended engineering practice to enhance the EMI/EMP immunity of electric power systems
Many papers and reports have been written on studies conducted by the Oak Ridge National Laboratory and investigations by others on the effect of high-altitude electromagnetic pulses (HEMP) on electric power systems. More than 100 of the published unclassified documents were reviewed with the objectives of: 1. summarizing the mitigation methods suggested in the documents and providing a subjective evaluation of each 2. discussing various standards . that presently apply to the effects of HEMP on utility systems and suggesting additions or modifications or new standards where deficiencies appear to exist; and 3. recommending future studies or actions to improvemore » -
Recommended engineering practice to enhance the EMI/EMP immunity of electric power systems
Many papers and reports have been written on studies conducted by the Oak Ridge National Laboratory and investigations by others on the effect of high-altitude electromagnetic pulses (HEMP) on electric power systems. More than 100 of the published unclassified documents were reviewed with the objectives of: 1. summarizing the mitigation methods suggested in the documents and providing a subjective evaluation of each 2. discussing various standards . that presently apply to the effects of HEMP on utility systems and suggesting additions or modifications or new standards where deficiencies appear to exist; and 3. recommending future studies or actions to improvemore »