The world is up in arms about the WikiLeaks release of a secret cable written in 2009 revealing over 100 facilities that the United States considers Critical Infrastructure and Key Resources (CIKR). The list includes undersea communications cables, hydroelectric plants, pharmaceutical facilities, and chemical manufacturing plants.
Yes, exposing specific facilities is a problem but it would be relatively easy for a diligent adversary to go through publicly-available information and piece together a similar list. WikiLeaks made this task easier but these critical infrastructure organizations and segments weren’t the best kept secret before the documents were posted.
Aside from focusing on these leaks, we must also ask ourselves an important related question: Are these critical infrastructure facilities vulnerable to attack?
I leave the question of physical vulnerability to the military, intelligence, and law enforcement community but I will comment on critical infrastructure vulnerability as it relates to cyber security. According to the recently published ESG Research Report, “Assessing Cyber Supply Chain Vulnerabilities in the U.S. Critical Infrastructure,” 20% of the critical infrastructure organizations surveyed said that their existing security policies, processes, and technology safeguards were “fair” or “poor.” (Note: The entire report is available for download on the ESG website, www.enterprisestrategygroup.com). Additionally, the research indicated that the health care sector tended to be less secure than other industries, which is particularly troubling in light of the WikiLeaks documents.
If I were the CISO at the pharmaceutical facilities identified in France and Denmark, I’d be doing emergency vulnerability assessments and making risk management decisions as a result of WikiLeaks. The ESG data indicates that this type of cyber security behavior shouldn’t be limited to facilities identified on WikiLeaks, however–rather it should be persistent across all critical infrastructure organizations.
Related posts:
Tags: CIKR, Critical Infrastructure, cyber security, cyber supply chain security, DHS, WikiLeaks
Name (required)
Mail (will not be published) (required)
Website
Your email: