No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Just Add Water: Latest Cyber Threat Coming From Your Kitchen Tap?

New EPA mandate aimed at cybersecurity of public water systems

by John Peiserich
May 24, 2023
in Cybersecurity, Governance
running faucet

The vast majority of Americans get their drinking water from public water systems, which are increasingly vulnerable to cyber attack thanks to reliance on automated, connected systems. ESG columnist John Peiserich explores a new EPA mandate designed to ensure these systems are secure.

About nine in 10 people in the U.S. get their drinking water from a public water system, with some 150,000 systems supplying that natural resource. Annually, systems are required to release a consumer confidence report, which includes items like contaminants present in the water and educational information on areas where contaminants may be of concern. 

In the past several years, information technology systems have been increasingly built into public water systems to enhance treatment and delivery. However, introduction of technology also presents potential risk. Infrastructure elements, including water processing and delivery, have traditionally struggled with the concept of integrating information technology (IT) with operational technology (OT). This integration becomes even more challenging with the introduction of Internet of Things devices added to the PWS ecosystem. 

These IT and OT advancements, including industrial control systems and supervisory control and data acquisition systems (ICS/SCADA), which can automate many elements of OT and improve the ability to monitor and control, can also increase risk. The potential risk is not just a systems breach but the interruption of critical services vital to our country, including power, telecommunications, roadways and, yes, water. 

water runoff
Compliance

What You Need to Know About ‘Forever Chemical’ Regulation in US & Europe

by Cally Edgren
April 19, 2023

So-called “forever chemicals” have been linked to serious health problems, and regulators in both the U.S. and Europe are poised to issue rules that would eliminate these chemicals from the supply chain. Assent’s sustainability director, Cally Edgren, explores the driving forces behind possible regulation.

Read moreDetails

Like other government and municipal entities, water utilities have budget limitations. Accordingly, introducing new IT that requires ongoing updates, monitoring and maintenance, necessitates additional investment to defend against public safety and national security threats to these critical infrastructure elements. 

The Safe Water Drinking Act (SDWA), under which the EPA exercises its oversight authority of the nation’s water supply, which requires states to conduct periodic audits or “sanitary surveys” of public water systems (PWSs), including the equipment and operation of the systems, also requires states to evaluate the cybersecurity of water systems, according to an EPA memo released in March.

EPA’s memo, released a day after the Biden Administration published a comprehensive cybersecurity plan for government agencies, industry, schools, hospitals and other key infrastructure, states, “While PWSs have taken important steps to improve their cybersecurity, a recent survey and reports of cyber-attacks show that many PWSs have failed to adopt basic cybersecurity best practices and consequently are at high risk of being victimized by cyber attack — whether from an individual, criminal collective or a sophisticated state or state sponsored actor.” 

It is a horrible day when corporate America is attacked; it can be deadly if water supplies are impacted.

How will states conduct cybersecurity reviews?

The memorandum allows states to adopt one of three options for incorporating cybersecurity review into PWS sanitary surveys. States may utilize 1) PWS or third-party assessment, 2) state evaluation during the sanitary survey or 3) an existing state water system cybersecurity program that is at least as stringent as a sanitary survey. Importantly, if a state allows PWSs to conduct their own cybersecurity evaluations or hire a third party, the assessment must be completed prior to the state sanitary survey. The state may also require the PWS to develop a risk mitigation plan prior to the sanitary survey to address any cybersecurity gaps that are identified during a self-assessment. Any method used for self-assessment would need to be conducted using a government or other state-approved method. Any private third party conducting the assessment would similarly need to be approved by the state.

What is the immediate industry response?

Industry response to the EPA’s new cybersecurity assessment requirement for PWSs has been mixed. Mike Hamilton, former chief security officer for the city of Seattle, commented that limiting approved assessment methodology to government or state-approved methods “make[s] this activity hard to scale across the breadth of water utilities across the country.” Tracy Mehan, executive director of government affairs at the American Water Works Association, similarly warns that the plan puts states in a tough position by directing that cybersecurity reporting should start immediately.

Integration of the EPA’s new cybersecurity assessment into PWS operations may depend on the current state of the utility. Facilities with integrated IT and OT that have any outward or public facing network elements likely already have a robust cybersecurity program. If not, they will likely have a steep hill to climb to successfully complete the EPA’s mandated cybersecurity assessment and will need to begin securing their networks expeditiously. 

If IT and OT are still separated, there may be less risk of a significant gap now being identified during state sanitary surveys, but this does not mean that immediate action will not still be necessary; rather, the potential impact of a cyberattack is segregated based on the isolated nature of the OT environment. Action to protect internet facing network elements will still be required. If a utility cannot bill or track service, it is effectively shut down, which may present a public safety or national security threat.

Conversely, reliance on the EPA’s memorandum alone may not be enough to secure the nation’s water supply. Tied to the current requirements for community and non-community state sanitary surveys, PWS cybersecurity assessments will be necessary once every three or five years, or more frequently where appropriate. Cybersecurity good practices typically suggest more frequent and ongoing assessment.

What can PWSs do now to accelerate compliance?

With its memo, EPA provides an optional checklist that states may use during a sanitary survey to evaluate the cybersecurity of a PWS’s operational technology. Prior to the rule coming into effect, if a state does not elect to implement a self- or third-party assessment, PWSs should give serious consideration to this checklist  and take steps to develop a plan that includes creating internal accountability and conducting an informal cybersecurity review sufficiently in advance of any upcoming sanitary survey to allow for implementation of corrective good practices prior to state assessment. 

For some PWSs, this will be starting from scratch. They should start with the EPA questions below and other free tools available to establish a picture of the current state and begin working on enhancing their ability to defend against and respond to cyberattack. 

Account security

  • Does the PWS detect and block repeated unsuccessful login attempts?
  • Does the PWS change default passwords?
  • Does the PWS require multi-factor authentication wherever possible but at a minimum to remotely access PWS operational technology (“OT”) networks?
  • Does the PWS require a minimum length for passwords?
  • Does the PWS separate user and privileged accounts?
  • Does the PWS require unique and separate credentials for users to access OT and IT networks?
  • Does the PWS immediately disable access to an account or network when access is no longer required due to retirement, change of role, termination or other factors?

Device security

  • Does the PWS require approval before new software is installed or deployed?
  • Does the PWS disable Microsoft Office macros, or similar embedded code, by default on all assets?
  • Does the PWS maintain an updated inventory of all OT and IT network assets?
  • Does the PWS prohibit the connection of unauthorized hardware to OT and IT assets?
  • Does the PWS maintain current documentation detailing the set-up and settings of critical OT and IT assets?

Data security

  • Does the PWS collect security logs to use in both incident detection and investigation?
  • Does the PWS protect security logs from unauthorized access and tampering?
  • Does the PWS use effective encryption to maintain the confidentiality of data in transit?
  • Does the PWS use encryption to maintain the confidentiality of stored sensitive data?

Governance and training

  • Does the PWS have a named role/position/title that is responsible and accountable for planning, resourcing, and execution of cybersecurity activities within the PWS?
  • Does the PWS have a named role/position/title that is responsible and accountable for planning, resources, and execution of OT-specific cybersecurity activities?
  • Does the PWS provide at least annual training for all PWS personnel that covers basic cybersecurity concepts?
  • Does the PWS offer OT-specific cybersecurity training on at least an annual basis to personnel who use OT as part of their regular duties?
  • Does the PWS offer regular opportunities to strengthen communication and coordination between OT and IT personnel, including vendors?

Vulnerability management

  • Does the PWS patch or otherwise mitigate known vulnerabilities within the recommended time frame?
  • Does the PWS ensure that assets connected to the public Internet expose no unnecessary exploitable services?
  • Does the PWS eliminate connections between its OT assets and the internet?

Supply chain/third party

  • Does the PWS include cybersecurity as an evaluation criterion for the procurement of OT assets and services?
  • Does the PWS require that all OT vendors and service providers notify the PWS of any security incidents or vulnerabilities in a risk-informed timeline?

Response and recovery

  • Does the PWS have a written procedure for reporting cybersecurity incidents, including how and to whom?
  • Does the PWS have a written cyber security incident response plan for critical threat scenarios which is regularly practiced and updated?
  • Does the PWS have backup systems necessary for operations on a regular schedule, store backups separately from the source systems, and test backups on a regular basis?
  • Does the PWS maintain updated documentation describing network topology across PWS OT and IT networks?

Other

  • Does the PWS segment OT and IT networks and deny connections to the OT network by default unless explicitly allowed?
  • Does the PWS keep a list of threats and adversary tactics, techniques, and procedures for cyberattacks relevant to the PWS and have the capability to detect instances of key threats?
  • Does the PWS use email security controls to reduce common email-based threats, such as spoofing, phishing and interception?
Kim Logue, an associate vice president in J.S. Held’s environmental, health & safety — risk & compliance group, and Ron Yearwood, a senior managing director in J.S. Held’s digital investigations and discovery group, contributed to this report.
This article was first published by J.S. Held. It is republished here with permission.

Tags: ESG
Previous Post

Build and Scope Better Vendor Due Diligence Questionnaires

Next Post

Companies Are Cracking Down on Chat Apps, But It’s Still Too Hard to Find What They’re Looking For

John Peiserich

John Peiserich

John Peiserich is a senior vice president in J.S. Held’s Environmental, Health & Safety — Risk & Compliance group. With over 30 years of experience, John provides consulting and expert services for heavy industry and law firms throughout the country with a focus on oil and gas, energy and public utilities. He has extensive experience evaluating risk associated with potential and ongoing compliance obligations, developing strategies around those obligations, and working to implement a client-focused compliance strategy. He has appointments as an independent monitor through EPA’s Suspension and Debarment Program. John routinely supports clients in a forward-facing role for rulemaking and legislative issues involving energy, environmental, oil and gas, and related issues.

Related Posts

news roundup new

Few Business Leaders Feel Fully Prepared for Challenges of 2025

by Staff and Wire Reports
June 20, 2025

Data center operators not using full slate of available sustainability tactics; companies continue to use AI without policies

polluted water

PFAS Reporting Window Delayed, but Waiting to Act on ‘Forever Chemicals’ Could Be Risky

by Cally Edgren
June 9, 2025

Technical issues on government portal give companies short reprieve

green sprint racers on a track

‘Green Sprint’ Your Way Past ESG Backlash

by Marga Hoek
May 21, 2025

As ESG programs face growing critique, organizations need practical approaches that deliver measurable results. Business sustainability expert Marga Hoek introduces...

eu flags brussels

EU’s Regulatory Retreat? The Omnibus Package’s Impact on Sustainability Reporting

by Jon Solorzano, Kelly Rondinelli and Jacob Baltzegar
April 28, 2025

Extended timelines and reduced requirements offer relief as substantial reforms remain under consideration

Next Post
whats app signal gmail phone icons

Companies Are Cracking Down on Chat Apps, But It’s Still Too Hard to Find What They’re Looking For

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights