Defra sets out cyber security strategy for water sector
The Government has published a cyber security strategy for the water sector, summarising what water and sewerage companies need to do to reduce the risks of cyber attacks.
Published by the Department for Environment, Food and Rural Affairs, the strategy, which focuses on attacks based around computers, computerised systems or networks, is mainly aimed at water and sewerage companies in England.
It says there are “credible cyber threats to UK Critical National Infrastructure, including the water sector,” and that these could lead to “serious consequences, particularly as increased automation and connectivity reduces the scope for standalone or manual operation of the water supply system.”
Recent reviews by government cyber experts have identified significant opportunities for the water sector to operate at a higher level of cyber security maturity.
The water-specific strategy is part of a government-wide response to the cyber threat, which complements the National Cyber Security Strategy (2016). The strategic vision and objectives have incorporated significant contributions from the sector and aim to guide activities across the sector, including water companies and government. It aims to achieve a vision by 2021 of a “secure, effective, and confident water sector, resilient to an ever-evolving cyber threat.”
Key objectives within the strategy include understanding the threats; managing the risk from these threats; managing any incidents that arise in the best way possible; and developing capabilities to increase future resistance and build cyber skills.
The cyber risk reviews identified a number of key areas in which the sector should focus its cyber security activities.
One of these is the architectural design/separation of Information Technology (IT) and Operational Technology (OT). The paper says that ideally IT and OT systems or networks should be completely separated to prevent infections in IT systems spreading and impacting processes that could cause physical damage.
It also flags up the cyber risk from third parties, with company networks increasingly accessed by third parties such as equipment suppliers, software suppliers and contractors who require the ability to upload software onto systems, make alterations and plug their equipment into the host network.
The paper says policies need to be in place to manage this risk, for instance by restricting the number of people with external accesses to a network and ensuring that devices plugged in to the host network are not carrying malware.
The full strategy is available to download here.
- Ofwat senior director of business improvement leaves Ofwat is recruiting for a new senior director of business improvement to replace Bev Messinger, who left the regulator on... Read More >
- Campaigners apply for judicial review against Thames Tideway Tunnel The Thames Tideway Tunnel project is facing a possible legal challenge after campaigners lodged an application for a... Read More >
- Defra slams 'false' compulsory metering reports Defra has described media reports that there will be compulsory water meters for millions of households following a... Read More >
- Yorkshire Water's decision-making uses ‘five capitals’ approach Yorkshire Water has developed a new decision-making framework for PR19 which quantifies natural and social factors Read More >
- Dealing Direct: Direct Procurement in the Water Industry Direct procurement for large projects may add to the water industry's investor appeal, writes Guy Ledger Read More >
- Comment: A Totex Journey The move to outcomes and Totex-Based Regulation in AMP6 should mean water companies and contractors involving suppliers ... Read More >
- Digging Deeper: Making the case for resilience Building resilience requires water utilities to have a clear and systematic understanding of risk across their business,... Read More >
- Interview: Professor Dragan Savic, Exeter University "If you can't measure, you can't manage - and the most uncertain element of water management is the demand." Read More >