Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Assessments May Lead to Insecurity

By Ryan Averbeck
March 1, 2008

Mandated vulnerability assessments and security experts may make facilities less secure.

Following the aftermath of September 11 and the enactment of the Public Health Security and Bioterrorism Response Act of 2002 (PL 107-188) various water entities (water treatment and wastewater facilities) were designated as critical infrastructures thus warranting increased protection.  The Environmental Protection Agency (EPA) was assigned the responsibility to develop plans for improving water infrastructure security. 

LACK OF EXPERIENCE

The first step towards improving security was the mandate to conduct vulnerability assessments.  With over 50,000 critical water entities the EPA was unable to conduct these assessments themselves and opted to require that “self” assessments be completed.  

With the explosive growth of the security market, a plethora of self proclaimed “experts” emerged to assist larger entities with these vulnerability assessments.  Most of these experts traditionally had a strong background in physical security or traditional information technology (IT) security, but no direct experience or understanding of the nuances of the daily operations of water facilities.  Even fewer had any experience or understanding of the specific cyber threats and vulnerabilities inherent in SCADA systems or other aspects of the operations that affect the availability, reliability or maintainability (ARM) of the entire system.

The adage calm seas do not make expert seamen also applies to security professionals, meaning experience with only one discipline of security (physical, IT, etc) or against one type of adversary (such as terrorists) does not an expert make.

While proficient at operating the facilities, most of the in-house staff assigned to complete the assessment did not have a background or experience in security. 

INSECURITY EXISTS

What emerged were two distinct versions or approaches to conduct vulnerability assessments:  one version completed by external security experts with limited knowledge of the systems they were assessing and the other version completed by system experts with limited knowledge of security and protection.  This divide causes difficulties because both approaches failed to identify several critical vulnerabilities and threats, incorrectly assumed existing protection was adequate, and did not highlight a specific path forward or roadmap to improve security over time in a cost effective manner. The fact that a vulnerability analysis was completed (albeit poorly) gave the asset owner a false sense of security.

The shortfalls that evolved because of the two types of assessments were highlighted during a case study conducted in April 2007 of a small municipal water treatment facility.  The entity under review provided the results of their previous vulnerability assessment and allowed site visits and interviews to assess their current levels of security and make recommendations for improvement.  The utility was chosen because they utilized three different self-assessment methods and tools to complete the initial self assessment, and it was conducted without the assistance of a security or protection professional.

CHECK THE PITFALLS

The case study highlights some of the pitfalls that occur when a vulnerability assessment is conducted by a person knowledgeable about the system but not intimately knowledgeable about security.

The results of the case study revealed that over 70 percent of the self assessment answers actually conflicted with what was observed by a security professional. For example, computer/server firewalls were installed but not properly configured (usually still set at the highly vulnerable factory presets), wireless networks were not properly secured, password policies and procedures did not exist (for the business as well as SCADA terminals). Most of the self assessments focused on physical security, where significant deviations were also noted such as fencing was present but contained significant holes or breaches and surveillance systems were present but placed in the wrong locations. Additionally, several high risk vulnerabilities were discovered that were not addressed in any of the previous vulnerability assessments.  Many of these concerned the ease with which sensitive customer data could be obtained and used for identity theft purposes.

The three main areas requiring attention included deficiencies in physical security, information technology security (both for business and SCADA systems), and the absence of adequate policies and procedures.  Common trends included: crediting specific security measures as being in place when in fact they were inadequate, and being unaware of specific risks and thus unaware of the need to implement additional countermeasures.  Examples of these trends include: Fencing was credited as in place at all locations when in fact all the fencing contained significant breaches, and management was unaware that sensitive customer information (name, address, SSN, credit card numbers, etc) is at risk to compromise and has not implemented any countermeasures to safeguard this data.

The self assessment did not accurately portray the security posture of the organization under review. A common thread with both versions of the assessments is that once completed the report was simply filed and no remediation or ongoing protection activities occurred.  The self assessment exercise was viewed as a regulatory paper drill and not seen as a security tool. Often, the items that were identified for enhanced protection during the assessment remained unprotected.  As a final note, after conducting an initial vulnerability assessment during the 2002-2004 timeframe, many water entities have not conducted follow-up reviews or updates to the assessments. 

By completing a self assessment many managers thought they were finished with the security requirements, and it is this false sense of completion that makes the facilities more vulnerable than ever. Additionally, having assistance from the wrong experts may be akin to calling a plumber for electrical problems. Security is a continuous process and not a quick fix.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ryan Averbeck is a principal systems security engineer in the Technology Protection and Management Office (TPMO) at Concurrent Technologies Corp. He is also currently a counterintelligence officer and commander in the U.S. Army Reserve.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Did Federal Building “Insecurity” Scandal Lead to Federal Protective Service Shake-up?

    See More
  • American flag in front of building columns

    Proposed rules may lead to increased compliance requirements ahead

    See More
  • Laptop in a dark room with coding on screen

    72% of CISOs believe AI solutions may lead to security breaches

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing