The International Society of Automation (ISA) calls for industrial system standard security analysis in wake of Stuxnet. It’s no state secret that industrial and automation control systems have a way to go before they’re resilient from targeted and sophisticated malware attacks. Just last week the International Society of Automation (ISA) announced that the ISA99 standards committee on Industrial Automation and Control Systems Security had formed a task group to conduct a gap analysis of the current ANSI (American National Standards Institute) ISA99 standards and modern threats against critical industrial systems, such as StuxnetThe ISA 99 standard provides guidance to control system operators on security technologies and how well they work (or don’t) at mitigating the risks associated with certain threats and vulnerabilities. The intent of this gap analysis is to determine if organizations that are following ISA 99 would have been able to fend off a Stuxnet-like attack and to identity any improvements the standard may need. A technical report is expected by mid-year 2011.Also see: “Why SCADA security must be addressed”The ISA 99 standard is a foundation of Supervisory Control and Data Acquisition System (SCADA) security. “Over the next few years, these standards will become core international standards for protecting critical industrial infrastructures that directly impact human safety, health, and the environment; and, likely will be extended to other areas of application, even broader than those generically labeled SCADA. Based on this, it is essential that industrial companies following IEC 62443 standards know they will be able to stop the next Stuxnet,” the ISA wrote in its statement announcing the security task force. The news of the ISA 99 gap analysis came the same day as the Security Incidents Organization released its 2011 report, Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems Resulting from Malware Infections.“This report shows the details of the continuing threats to manufacturing and infrastructure security around the world. As the Stuxnet malware showed in 2010, the threat continues and has become even more complicated and mature,” John Cusimano, executive director of the Security Incidents Organization (SIO), said in a statement. The threats may be growing more mature and complex, however experts say the vulnerabilities have been laying in wait for some time. “Stuxnet really didn’t change anything,” says Richard Stiennon, chief research analyst, IT-Harvest and author of the book “Surviving Cyberwar.”“The vulnerabilities have all been there for awhile. Most SCADA networks are pretty wide open and are susceptible to attacks. Stuxnet did, however, open our eyes to what is possible now,” he says.Many industry and critical manufacturing systems are open to not only Stuxnet-like attacks, but also trivial attacks. “Many of these systems are listening on open ports for broadcast messages. And, for example, if they get the right one, they’ll reset back to factory settings. There’s no authentication of signing processes in place,” he says. “So while it’s good to have standards, the real problem is why haven’t facilities been employing security 101 practices?” Stiennon asks. George V. Hulme writes about security, technology, and business from his home in Minneapolis, Minnesota. You can also find him on Twitter as @georgevhulme. Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe