Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceInfrastructure:Electric,Gas & Water

Best practices for securing critical and public infrastructure

By Rebecca Herold
Inside of water disposal pipe

Image via Unsplash

May 14, 2024

The United States government defines the “critical infrastructure” as 16 specific sectors considered so vital to the U.S. that their incapacitation or destruction would have a debilitating effect on security, national economic security and national public health and/or safety.

The “public infrastructure” is a subset of the critical infrastructure and includes roads, bridges, public transportation and airports, drinking water and wastewater treatment systems, solid waste services and facilities, and other important utilities essential to communities to sustain life and to protect the environment, public health and safety.

Millions of federal, state and local agencies, as well as private and public entities are in the critical infrastructure and range from the one-person support businesses to millions-of-employee organizations. Most communicate in some way with other critical infrastructure entities, but few of them truly coordinate their security activities. The technologies they depend upon range from legacy to newer tools. And all have significant vulnerabilities, making them attractive targets for the threat actors wanting to disrupt society and/or obtain financial gain. 

Hacking and other cybersecurity threats to the critical infrastructure encompass a wide spectrum, including but not limited to, ransomware attacks, nation-state espionage, supply chain vulnerabilities, sophisticated malware, advanced persistent threats (APTs), AI-driven attacks, distributed denial-of-service (DDoS) attacks, phishing schemes and exploitation of vulnerabilities in associated systems. Additionally, there are physical threats and threats created by malicious insiders, and insiders who lack the training and awareness to be able to protect against as many of these threats as possible. Such threats pose significant challenges to national security, economic stability and public safety. 

Due to the significant physical and safety harms involved, organizations need to have additional security controls to ensure all parts of their ecosystems have all the security needed to effectively sustain life, protect the environment and public health and support safety.

All vulnerabilities in any digital ecosystems cannot be entirely eliminated, especially as more vulnerabilities are created daily even as others are eliminated. All threats can never be completely identified prior to their exploitation of the vulnerabilities; however, having a comprehensive security program can greatly assist in identifying and mitigating threats. 

History has demonstrated that these types of programs have long been woefully underfunded, resulting in significant vulnerabilities and putting the public at cyber, physical and safety risks as a result. 

These facts create significant security and privacy challenges to minimizing as many vulnerabilities and threats as possible, while supporting the availability of critical infrastructure resources and services.

Investments in robust, continuous and comprehensive physical, technical and administrative strategies are necessary to eliminate as many vulnerabilities and threats as possible and to mitigate the associated risks to a level that will protect the public from a wide range of harms. How to accomplish this, however, depends upon the digital ecosystem within each organization in the critical infrastructure sectors.

Some of the specific types of controls that are most appropriate to the risk environment of each sector include:

  • Administrative controls. These are security controls primarily implemented and executed by people as opposed to technologies and physical mechanisms. Administrative controls include documented and enforced information security and privacy policies as well as associated procedures in each organization’s areas that support meeting the required policy outcomes. It also involves regular security training in addition to ongoing and frequent reminders for actions needed during daily work activities as well as risk management activities, such as performing risk assessments at least annually, and ongoing risk reviews of work areas and personnel activities. 
  • Physical controls. These are security controls that provide physical barriers and access controls to protect the components within the information systems, limit physical access to work areas to only those who have a business need to be in those areas, and restricting access to buildings and related equipment to protect them from natural, human and environmental hazards and unauthorized intrusions. Protection in the field, to equipment and components supporting the public infrastructure are especially important to implement and manage on an ongoing basis for public safety. 
  • Technical controls. These are security controls for systems, computing devices and associated components that are primarily implemented and executed through mechanisms contained in associated hardware, software and firmware. Software and firmware are increasingly vulnerable from coding errors and lack of supply chain transparency and security assurance, creating many risks, such as the insertion of counterfeit parts into mission critical hardware components, and injection of malicious software code. Also, if vulnerabilities in the supply chain and within any other part of technical security controls are exploited, the consequences can affect everyone using the associated technology or service. Such exploitations within the public infrastructure can be deadly, resulting in such outcomes as poisoned water systems and a loss of energy sources that people depend upon to live.

Entities supporting critical infrastructure components must implement a comprehensive set of administrative, physical and technical tools and practices specific for each associated product and/or service ecosystem. Anything less is not sufficient, and leaves the associated services and products highly vulnerable, putting the full public at risk.

KEYWORDS: best practices critical infrastructure critical infrastructure cybersecurity threat mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rebecca herold headshot

Rebecca Herold is an IEEE Member, CEO of Privacy & Security Brainiacs SaaS Services and The Privacy Professor Consultancy. She is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Herold led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Image courtesy of Herold 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video conference

    Staying Protected While Connected – Video Conferencing Best Practices for Businesses and Consumers

    See More
  • c-suite

    Three Best Practices to Secure Critical Infrastructure

    See More
  • Locked data

    Best practices for effectively securing sensitive data

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing