The network controlling the US's largest public electric company could be taken down by cyber-hackers because it fails to take basic best-practice security measures, a federal report says.
Despite federal guidelines for securing such networks, the Tennessee Valley Authority power company does not comply with security practices recommended in a report by the US Government Accountability Office.
"Until the TVA fully implements these security program activities, it risks disruption of its operations as the result of a cyber incident, which could impact its customers," the GAO says. TVA delivers electricity to an area that includes most of Tennessee and parts of Alabama, Georgia, Kentucky, Mississippi, North Carolina and Virginia -- an area with a population of 8.7 million people.
The TVA ineffectively separates its control network from its corporate data network, which includes a dangerous blend of badly patched equipment, inadequate security settings and limited intrusion detection, according to a report by the GOA.
Shortcomings of its supervisory control and data acquisition network itself included misconfigured or inactivated firewalls, ineffective passwords, inconsistent configuration management and lack of virus protection, according to the report, "TVA Needs to Address Weaknesses in Control Systems and Networks".
TVA has no comprehensive inventory of its SCADA network and has not ranked network elements according to risk, "thereby limiting assurance that these systems were adequately protected," the report says.
Overall, the authority needs to complete security plans, prioritize its patch management, test its SCADA network for security and execute security training, the report says.
"As a result, systems that operate TVA's critical infrastructures are at increased risk of unauthorized modification or disruption by both internal and external threats," the report says.
"This is not a TVA-specific problem," says Ira Winkler, CEO of Internet Security Advisors Group. "This is a pervasive threat to the whole power industry."
During a talk at RSA Conference earlier this year, he said the blending of SCADA and corporate data networks and their connection to the Internet has boosted the risk of hacking. He detailed how he hacked into a utility's network -- not the TVA -- and took over individual machines.
In its report, the GOA agreed. It cited a 2006 TVA incident at a nuclear power plant in Alabama in which two pumps failed, forcing the shutdown of the plant. The pumps failed because the network was clogged by traffic generated when another device on the network failed.
The GOA in a private report lays out 73 recommendations for TVA to improve its security.
When the Federal Energy Regulatory Commission approved network security guidelines for power companies earlier this year, it said that power company officials acknowledge that some of their gear was so old it could not readily adhere to the rules.
Winkler says the GAO report on TVA applies to the power industry in general, and fixing just the TVA is not the way to go. "The government is trying to find a specific fire to put out," he says. "Everybody looks for an example instead of addressing the problem until you see the devastating attacks, and then everyone will overreact.
"There is no reason to drastically overreact if they take action now," he says.