The Reality of Critical Infrastructure

By Pepijn van der Stap 7 min read
SCADA ICS security critical infrastructure

SCADA edge nodes parsing raw UDP with unchecked pointers. ICS ports opened during backbone transit with no authentication. Full trust. This is the reality of the systems running our most critical infrastructure.

Attackers don't just seek undefined behavior; they exploit the blind spots created by flawed design, outdated standards, and deliberate neglect. Metrics like CVE counts are superficial. The truth is in the protocols.

The Security Theater

Walk into any modern data center and you'll see badge readers, biometric scanners, and security cameras at every corner. walk into a power plant and you'll find the same theater. but the real security decisions were made decades ago, embedded in firmware that hasn't been updated since the Clinton administration.

Modbus TCP carries no authentication. DNP3 can be configured with security features, but they're rarely enabled because they break legacy compatibility. IEC 61850 promised cryptographic protection for electrical substations, but most implementations still run in cleartext.

These aren't bugs. They're design decisions made when security meant "put it behind a firewall and hope for the best."

The Air Gap Myth

"Our SCADA network is air-gapped," they say. Yet somehow, real-time production data flows to the corporate network for reporting. Maintenance laptops move between domains. VPN connections exist "for emergencies."


The air gap is more like a screen door. And once you're inside, lateral movement is trivial because industrial networks assume everything behind the perimeter is trusted.

The Human Bridge

Even perfectly air-gapped networks have humans. Humans who plug in USB drives from unknown sources. Humans who configure wireless access points for convenience. Humans who document everything in Excel spreadsheets that get emailed to contractors.

Stuxnet didn't need network access to reach Natanz. It needed human behavior, which is far more predictable than any protocol vulnerability.

Protocol-Level Nightmares

Most security researchers focus on web applications and enterprise software. The disclosure timelines are faster, the vendors more responsive, the bounties larger. But the protocols that run critical infrastructure are where the real vulnerabilities hide.

Modbus: Trust by Default

Modbus was designed in 1979 for serial communication between industrial devices. The TCP/IP wrapper added in 1999 brought networking capabilities but no security improvements.

Every Modbus command is trusted. There's no authentication, no encryption, no replay protection. If you can reach the device, you can control it. This isn't a vulnerability—it's the protocol working as designed.

DNP3: Security as an Afterthought

DNP3 Secure Authentication was added in 2013, nearly two decades after the original protocol. The security features are comprehensive—when enabled. But enabling them breaks compatibility with legacy devices, so most deployments run in "non-secure" mode.

Security that's optional isn't security. It's a checkbox for compliance auditors.

OPC UA: The New Hope

OPC UA was supposed to solve industrial security with built-in encryption and authentication. In practice, it's often configured in "None" security mode because encrypted communication doesn't work with packet inspection tools that operators rely on for troubleshooting.

The protocol supports strong security. The implementations undermine it for operational convenience.

The Physics Problem

Industrial control systems have a fundamental constraint that IT systems don't: physics. If a safety system doesn't respond within 100 milliseconds, people die. If a power grid stabilization algorithm is delayed by cryptographic overhead, cascading failures can black out entire regions.

This isn't theoretical. The 2003 Northeast blackout started with a software bug in an alarm system. The 2010 Brazil blackout was triggered by operational errors during maintenance. Reliability and security are often in direct conflict.

What Real Security Looks Like

Securing critical infrastructure isn't about adding more firewalls or deploying better antivirus. It's about accepting that the protocols we've built our civilization on are fundamentally insecure, and designing resilience around that reality.

Defense in Depth, Actually

  • Network segmentation with unidirectional data diodes for monitoring
  • Protocol whitelisting that blocks unexpected commands at the packet level
  • Behavioral monitoring that detects anomalous control sequences
  • Physical security for field devices, not just control rooms
  • Incident response that assumes compromise and focuses on containment

The Long Game

Real change requires replacing protocols, not patching them. IEC 62443 provides a framework for secure-by-design industrial systems. NERC CIP mandates security controls for bulk electric systems. But both are relatively new standards fighting against decades of legacy infrastructure.

The transition will take decades. In the meantime, we're running 21st-century civilization on 20th-century protocols with 19th-century security assumptions.

Conclusion

If your work involves reverse-engineering firmware or fuzzing undocumented stacks, you are tackling the work that truly moves the needle <3. The vulnerabilities you find in industrial protocols don't just compromise data—they can compromise physical safety.

The stakes are higher. The timelines are longer. The resistance to change is stronger. But the impact of getting it right is civilization-scale.

Reality Check

Next time someone talks about "cyber-physical security," ask them about protocol authentication. If they mention Modbus TCP in the same sentence as "secure," walk away. They're selling security theater, not security.