Unplugging From Digital Controls to Safeguard Power Grids

Unplugging From Digital Controls to Safeguard Power Grids

  • August 4, 2019
Table of Contents

Unplugging From Digital Controls to Safeguard Power Grids

Late last week, the U.S. House of Representatives passed legislation to mandate federal research on a radically ‘retro’approach to protect power grids from cyber attack: unplugging or otherwise isolating the most criticalequipment from grid operators’ digital control systems. Angus King, an independent senator from Maine whose identical bill passedthe Senate last month, says such a managed retreat from networked controls may berequired to thwart the grid’s most sophisticated online adversaries. Grid cyber experts say the Securing Energy Infrastructure Act moving through Congress isa particular testament toMichael Assante, a gifted and passionate cybersecurity expert whodied earlier this monthfrom leukaemia at the age of 48.

“If you were to point to just one person as the primary driver, it would have to be Michael,” says colleague Andrew Bochman, senior cyber and energy security strategist at Idaho National Laboratory (INL). Senator King recentlytoldThe Washington Postthat research at INL kicked-off by Assante had inspired the bill. Assante trained in cyberdefense as a naval intelligence officer and then joined the power industry in 2002 as chief security officer (CSO) for U.S. electricity giant American Electric Power.

Encounteringskepticism about the grid’s cyber vulnerability, Assante moved to INL in 2005 to prove the case. There heled the infamousAurora Generator Test. The video below captures itsdramatic results.

Source: ieee.org

Share :
comments powered by Disqus

Related Posts

33(+) Kubernetes security tools

33(+) Kubernetes security tools

Kubernetes image scanning Kubernetes runtime security Kubernetes network security Image distribution and secrets management Kubernetes security audit End-to-end commercial security tools Join our live session to learn more! Kubernetes security tools … there are so freaking many of them; with different purposes, scopes and licenses. That’s why we decided to create this Kubernetes security tools list, including open source projects and commercial platforms from different vendors, to help you choose the ones that look more interesting to you and guide you in the right direction depending on your Kubernetes security needs.

Read More
Docker and Kubernetes in high security environments

Docker and Kubernetes in high security environments

This is brief summary of parts of my master’s thesis and the conclusions to draw from it. This medium-story focuses on containerized application isolation. The thesis also covers segmentation of cluster networks in Kubernetes which is not discussed in this story.

Read More
CVE-2018-18264 Privilege escalation through Kubernetes dashboard

CVE-2018-18264 Privilege escalation through Kubernetes dashboard

A recently disclosed vulnerability in Kubernetes dashboard (CVE-2018-18264) exposes secrets to unauthenticated users. In this blog post we’ll explore some key takeaways regarding monitoring privilege escalation on Kubernetes. The Kubernetes dashboard is a web based user interface that allows users to manage applications and resources within the cluster.

Read More