WATER SECTOR CYBERSECURITY BRIEF FOR STATES
How to Use This Brief
EPA developed this brief in cooperation with the Association of State Drinking Water Administrators’ Security
Committee to help state staff (or their designated assistance providers) start a conversation with utilities about
cybersecurity. Information gathered from the questions on this page can help you to understand a utility’s current
cybersecurity practices and point them toward resources to enhance their program. You may also leave the next
two pages with the utility as a reminder of your discussions. Those pages provide recommendations for building a
cybersecurity program and responding to cyber-attacks.
10 Questions for a Cybersecurity Dialogue with a Utility*
Does your utility …
1. Keep an inventory of control system devices and ensure this equipment is not exposed to networks
outside the utility?
Never allow any machine on the control network to “talk” directly to a machine on the business network or
on the Internet.
2. Segregate networks and apply firewalls?
Classify IT assets, data, and personnel into specific groups, and restrict access to these groups.
3. Use secure remote access methods?
A secure method, like a virtual private network, should be used if remote access is required.
4. Establish roles to control access to different networks and log system users?
Role-based controls will grant or deny access to network resources based on job functions.
5. Require strong passwords and password management practices?
Use strong passwords and have different passwords for different accounts.
6. Stay aware of vulnerabilities and implement patches and updates when needed?
Monitor for and apply IT system patches and updates.
7. Enforce policies for the security of mobile devices?
Limit the use of mobile devices on your networks and ensure devices are password protected.
8. Have an employee cybersecurity training program?
All employees should receive regular cybersecurity training.
9. Involve utility executives in cybersecurity?
Organizational leaders are often unaware of cybersecurity threats and needs.
10. Monitor for network intrusions and have a plan in place to respond?
Be capable of detecting a compromise quickly and executing an incident response plan.
11. For more information about each of these questions, see WaterISAC 15 Cybersecurity Fundamentals for Water and
Wastewater Utilities at https://www.waterisac.org/fundamentals.
Taking the Next Step with a Utility
If utility staff can knock each of these questions/answers out of the park, then the utility has a good cybersecurity
program in place. However, if the response to these questions is “No,” “Not sure,” or “How about this weather?”
then encourage the utility to use the next page to start building a cybersecurity program.