ICS Cyber Security Use Case #1 - What would you do about default passwords

I continue to be reminded there has been too much discussion on problems and not enough on solutions (even though we keep finding new problems).  What seems obvious to me may not seem as obvious to others. To address those concerns, I will provide a series of ICS cyber security use cases to get your feedback on how you would address these actual cases. 

Aug. 30, 2010
2 min read

I continue to be reminded there has been too much discussion on problems and not enough on solutions (even though we keep finding new problems).  What seems obvious to me may not seem as obvious to others. To address those concerns, I will provide a series of ICS cyber security use cases to get your feedback on how you would address these actual cases. 

Use case 1 – Default passwords. There are reasons for keeping default passwords (rarely changed changed passwords generally known to many users) in an ICS.  However, IT security policy and the NERC CIPs require default passwords to be changed to “strong” passwords and changed periodically. In a benign office environment, this won’t cause unacceptable conditions. In an industrial setting such as a power plant, this can also be acceptable during normal operation. However, during an upset condition when personnel are under high stress, trying to remember whether a slash is forward or backward can be a real problem especially if there isn’t a “yellow sticky” on the computer screen which in itself is a security problem. One possibility of addressing the default password issue would be the use of biometrics. How would you address the default password issue in an operational environment without adversely impacting the safe and reliable operation of the facility?

Joe Weiss

About the Author

jweiss

jweiss

Sign up for our eNewsletters
Get the latest news and updates