The network controlling the US's largest public electric company could be taken down by cyber-hackers because it fails to take basic best-practice security measures.
Despite federal guidelines for securing such networks, the Tennessee Valley Authority power company does not comply with security practices recommended in a report by the US Government Accountability Office (GOA).
"Until the TVA fully implements these security program activities, it risks disruption of its operations as the result of a cyber incident, which could impact its customers," the GAO says. TVA delivers electricity to an area that includes most of Tennessee and parts of Alabama, Georgia, Kentucky, Mississippi, North Carolina and Virginia -- an area with a population of 8.7 million people.
The TVA does not properly separate its control network from its corporate data network, which includes a dangerous blend of badly patched equipment, inadequate security settings and limited intrusion detection, according to a report by the GOA.
Shortcomings of its supervisory control and data acquisition (SCADA) network itself included misconfigured or inactivated firewalls, ineffective passwords, inconsistent configuration management and lack of virus protection, according to the report, "TVA Needs to Address Weaknesses in Control Systems and Networks".
TVA has no comprehensive inventory of its SCADA network and has not ranked network elements according to risk, "thereby limiting assurance that these systems were adequately protected," the report says.
Overall, the authority needs to complete security plans, prioritise its patch management, test its SCADA network for security and execute security training, the report says.
"As a result, systems that operate TVA's critical infrastructures are at increased risk of unauthorised modification or disruption by both internal and external threats," the report says.
"This is not a TVA-specific problem," says Ira Winkler, CEO of Internet Security Advisors Group. "This is a pervasive threat to the whole power industry."
During a talk at RSA Conference earlier this year, he said the blending of SCADA and corporate data networks and their connection to the Internet has boosted the risk of hacking. He detailed how he hacked into a utility's network -- not the TVA -- and took over individual machines.
In its report, the GOA agreed. It cited a 2006 TVA incident at a nuclear power plant in Alabama in which two pumps failed, forcing the shutdown of the plant. The pumps failed because the network was clogged by traffic generated when another device on the network failed.
The GOA in a private report lays out 73 recommendations for TVA to improve its security.
Find your next job with computerworld UK jobs