Skip to main content

A Security Assessment Methodology for Critical Infrastructures

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8985))

Abstract

Interest in security assessment and penetration testing techniques has steadily increased. Likewise, security of industrial control systems (ICS) has become more and more important. Very few methodologies directly target ICS and none of them generalizes the concept of “critical infrastructures pentesting”. Existing methodologies and tools cannot be applied directly to critical infrastructures (CIs) due to safety and availability requirements. Moreover, there is no clear understanding on the specific output that CI operators need from such an assessment. We propose a new methodology tailored to support security testing in ICS/CI environments. By analyzing security assessments and penetration testing methodologies proposed for other domains and interviewing stakeholders to identify existing best practices adopted in industry, deriving related issues and collecting proposals for possible solutions we propose a new security assessment and penetration testing methodology for critical infrastructure.

This work has been partially supported by the European Commission through project FP7-SEC-285477-CRISALIS funded by the 7th Framework Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Deraison, R., Meer, H., Walt, C.V.D.: Nessus Network Auditing. Syngress Media Incorporated (2004)

    Google Scholar 

  2. Searle, J.: NESCOR Version 3 - Guide to Penetration Testing forElectric Utilities (2012). http://www.smartgrid.epri.com/nescor.aspx

  3. Herzog, P.: OSSTMM 3–The open source security testing methodologymanual (2010). http://www.osstmm.org/

  4. Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A.: NIST Special Publication 800–115: Technical Guide to Information Security Testing and Assessment (2008)

    Google Scholar 

  5. Rathore, B., Brunner, M., Dilaj, M., Herrera, O., Brunati, P., Subramaniam, R.K., Raman, S., Chavan, U.: ISSAF 0.2.1 - Information Systems Security Assessment Framework (2006)

    Google Scholar 

  6. CRitical InfrastructureSecurity AnaLysIS (CRISALIS) (2012). http://www.crisalis-project.eu/

  7. Duggan, D., Berg, M., Dillinger, J., Stamp, J.: Penetration testing of industrial control systems. Sandia National Laboratories (2005)

    Google Scholar 

  8. Metasploit, L.: The metasploit framework (2007). http://www.metasploit.com/

  9. Tenable, SCADA Security. http://www.tenable.com/solutions/scada-security

  10. UtiliSec, Samurai Project’s Security Testing Framework for Utilities (Samu-raiSTFU). http://www.samuraistfu.org/

  11. Offensive Security Ltd., Kali Linux. http://www.kali.org/

  12. Radvanovsky, R., Brodsky, J.: SCADA Strangelove or How Ilearned to StartWorrying and Love Nuclear Plant. http://www.scadasl.org/

  13. Matherly, J.: Expose online devices, May 2013. http://www.shodanhq.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Caselli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Caselli, M., Kargl, F. (2016). A Security Assessment Methodology for Critical Infrastructures. In: Panayiotou, C., Ellinas, G., Kyriakides, E., Polycarpou, M. (eds) Critical Information Infrastructures Security. CRITIS 2014. Lecture Notes in Computer Science(), vol 8985. Springer, Cham. https://doi.org/10.1007/978-3-319-31664-2_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31664-2_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31663-5

  • Online ISBN: 978-3-319-31664-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics