Introduction to Control System Cyber Security and Curated Resources
This article introduces control system cyber security, warns against unqualified experts, and provides a curated list of trusted resources—including papers, libraries, talks, and challenges—to help practitioners deepen their understanding of industrial control system security.
Intro to Control System Cyber Security
Cybersecurity is not a new topic but in industrial control systems (ICS) it remains largely unexplored. The hardest part for most people is learning whom to trust and which resources are reliable. Beware of self‑proclaimed “SCADA Security Gurus” without relevant experience; critical evaluation of credentials is essential. Below is a curated list of trusted resources to aid your journey.
An Abbreviated History of Automation and ICS Cybersecurity
This SANS paper provides a comprehensive background on the evolution of ICS cybersecurity over the past two decades.
SANS ICS Library
The library offers numerous posters and papers for beginners, along with a blog and the Defense Use Case series that examines real and hypothetical ICS attacks.
SCADAHacker Library
Joel’s collection contains papers on ICS security standards, protocols, and systems, offering valuable technical content.
The ICS Cyber Kill Chain
A paper co‑authored with Michael Assante that outlines the distinct steps adversaries take to compromise ICS environments.
Analyzing Stuxnet (Windows Portion)
Bruce Dang’s presentation from the 27th CCC in Germany details the Windows side of Stuxnet analysis, highlighting the dual IT/OT nature of such investigations.
Analyzing Stuxnet (ICS Portion)
Ralph Langer’s talk delves into the OT‑specific payload of Stuxnet, offering insight into industrial impact.
To Kill a Centrifuge – Stuxnet Analysis
Ralph Langer’s paper explores the technical details and impact of Stuxnet’s ICS payload, encouraging readers to research unfamiliar terms.
SANS ICS Defense Use Case #5 – Ukraine Power Grid Attack
A collaborative analysis of the 2015 Ukraine power grid attack, providing defense recommendations for each stage of the ICS kill chain.
Perfect ICS Storm
Glenn’s paper examines the interconnectivity of ICS and surrounding networks, discussing implications for monitoring and visibility.
Network Security Monitoring in ICS 101
Chris Sistrunk’s introductory talk from DEFCON 23 explains how passive network monitoring can meet the safety and reliability constraints of ICS.
Achieving Network Security Monitoring Visibility with Flow Data
A SANS webcast featuring the author and Chris Sander demonstrating the FlowBAT tool for ICS network monitoring.
S4 Videos
The S4 conference, organized by Dale Peterson, provides numerous presentations that showcase the perspective of ICS security researchers.
Defense Will Win
Dale Peterson’s uplifting talk promotes the mantra “defense is doable,” emphasizing that robust, defensible ICS environments are achievable.
The ICS Cyber Security Challenge
An annual SANS‑sponsored challenge offering questions and data sets to help participants advance their ICS security skills.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Architects Research Society
A daily treasure trove for architects, expanding your view and depth. We share enterprise, business, application, data, technology, and security architecture, discuss frameworks, planning, governance, standards, and implementation, and explore emerging styles such as microservices, event‑driven, micro‑frontend, big data, data warehousing, IoT, and AI architecture.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
