It has become impossible to run our critical infrastructure systems in the modern world without incorporating technology. There are naturally given risks when dealing with any form of technology. Still, even more significant risks are presented when trying to maintain the systems we need to keep technology running. Luckily, SCADA systems help to keep those systems safe and operating. SCADA systems, or Supervisory Control and Data Acquisition Systems, are systems of computer hardware and software set up to help manage critical infrastructure. Without SCADA systems running, critical infrastructure faces many significant vulnerabilities that have been exploited in the past and likely will be exploited in the future.
Vulnerabilities of Critical Infrastructure Systems
With critical infrastructure needing to use technology currently, it is met with all of the common flaws plaguing cybersecurity. Beyond that, it has more significant risks considering that it is, as stated in the name, critical for society to operate. Although SCADA systems are disconnected from the internet to ensure an online attack, the risk of unauthorized access is still a threat that could prove dangerous. SCADA systems still need to receive commands and processes, either sent through VPNs or uploaded directly to the computer. As is the issue with all forms of cybersecurity, someone can get access to someone else’s email or the computer itself and send a malicious file which will execute as soon as it is uploaded to the SCADA system. This was seen most prominently in 2015’s ProClima attack (TrendMicro). The systems themself also have abysmal security as most people believe that they run sufficiently simply enough by lacking internet access. Most SCADA users rely on VPNs and assume that that will be enough to protect the system. Considering SCADA systems operate power distribution, transportation routing, industrial processes, and even basic systems such as traffic lights, they are clearly some of the most vital systems currently in society and should not be treated lightly.
Mitigation of Risks Through SCADA Systems
Considering all of the associated risks with SCADA systems, tightening the security of future and existing systems is critical. While currently specialized industrial VPNs are being created by SCADA creators, there is a slew of other mitigation methods that now exist to ensure the safest SCADA systems. Many SCADA system OSs are outdated, and many users don’t even realize this. You should ask your SCADA manufacturer for a guide on how to patch the system and be sure to keep it up to date (Alcala). Simple security solutions such as user-based authentication and token authentication, with the tokens possibly even going to a single person whose job is to ensure the correct person is accessing the system. Although SCADA systems exist on an airgap, they still have multiple connections to ensure they can run all critical infrastructure. To further strengthen the system’s safety, ensure that all unnecessary systems are disconnected and monitor the security of remote locations with access to the system. When done correctly, SCADA systems can exist independently, leaving the only need for defense up to physical security.
Conclusion
SCADA systems are the machines we rely on to run our critical infrastructure, so they should have just as much security as an airport, a power plant, or a water supply. While the current means of protection seem outdated, that is not to say they are ineffective. Nonetheless, we should always continue improving the safety of a system so crucial that our lives depend on it. With a few more improvements, SCADA systems can be impenetrable to all attacks besides a physical attack resulting from human error. Even then, it will become much easier to apprehend the attacker and quickly correct the issue. SCADA security’s future is safe if we take steps in the right direction now.
References
https://www.compassitc.com/blog/protecting-scada-systems-from-cyber-attacks