Commercial Enterprises:

INTEGRITY—When Life Depends On It

Securing Water and Wastewater Management Utilities from Cyber Attack

Water and wastewater management utility leaders have been put on notice...

"Our information infrastructure—including...embedded processors and controllers in critical industries—increasingly is being targeted for exploitation and potentially for disruption or destruction." — J. Michael McConnell, Director of National Intelligence, February 7, 2008

160,000 public water systems. 2.3 million miles of distribution pipes. $150 billion in revenue. 84% of the total US population is served by public water systems. 51 billion gallons of drinking water are produced every day in the US, with 67% going to residential customers. $214 million spent on Industrial Control Systems. One billion gallons of water mistakenly released from a St. Louis, MO water storage dam due to remote monitoring problems.

An entire water industry subject to attack by a single hacker working from anywhere in the world. It's not a matter of if; it's only a matter of when.

  • Expose thousands or millions of people to chemical over- or under-dosing
  • Divert or disable water service
  • Block or spoof data to make it impossible for operators to manage their utility
  • Change or disable alarm thresholds
  • Steal, change, delete or block account information

Sooner or later, cyber security strategies based on "pierce and patch" will result in:

  • Executives not in compliance with Federal laws and facing fines and/or prison sentences
  • Widespread economic upheaval as a disruption in water services impacts other dependent industries, especially electricity production
  • Millions of dollars lost defending or settling class action lawsuits
  • Millions of dollars spent on restoring operations or refunding money to customers
  • Bankruptcy
  • Potential for environmental and medical disasters that could include loss of life

A cyber security strategy based on "pierce and patch" is--

Unfathomable. Unacceptable. Untenable. Uneconomic.
And has largely been unfixable — until now.

INTEGRITY — the most secure and reliable software system ever developed — can provide water utilities with certified unbeatable cyber asset security. The National Information Assurance Partnership (NIAP) has awarded INTEGRITY a rating of EAL6+ High Robustness. No software system has ever come close to these ratings before INTEGRITY.

With INTEGRITY, mission critical applications stay secure, customer data remains private, and control and command applications work without the possibility of intentional, hostile, well-funded, internal or external attack. And it's been certified — not once, but multiple times.

The Water Sector Government Coordinating Council (GCC) released its "2010 Water Sector-Specific Plan (SSP)" which "provides the overarching framework for integrating Water Sector critical infrastructure and key resource protection efforts into a unified program coordinated by the Department of Homeland Security." The ten-year plan outlined in this report calls for water utilities to:

Develop and Deploy Industrial Control System (ICS) Security Programs — INTEGRITY enables utilities to establish their own enterprise-wide and system-level protocols.

Assess Risk — INTEGRITY makes determining where vulnerabilities exist by simply eliminating the risk. Remediation is also simplified as viruses and malware are eliminated with a single mouse click.

Develop and Implement Risk Mitigation Measures — INTEGRITY ensures that critical cyber assets are always safe and always available from INTEGRITY-enabled data storage facilities should mitigation be required due to physical damage to an ICS.

Certified as secure and reliable for both military and non-military use as a result of the most rigorous testing and evaluation possible, INTEGRITY offers:

  • True security
    • Open communication is possible without risk to critical assets
    • Mission critical assets and applications remain completely safe and secure
  • Cost savings
    • INTEGRITY Secure Consolidated Client (ISCC)
    • Simultaneous support of legacy and mission critical applications
  • Form flexibility
    • Protect desktop PCs, servers, Thin-Client Workstations and even PDAs
  • Open Standards
    • Supports Windows and Linux
    • Supports native POSIX-compliant applications
  • Certified security and reliability—no other operating system can offer this level of security and reliability and no other operating system has ever been certified to the levels of INTEGRITY

To learn more about how INTEGRITY Global Security can secure your water utility, please call 805.882.2500 or send email.

© INTEGRITY Global Security    |    Site Map    |    Contact Us