WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships '15CFAM' is More than FUN with Consequence-driven Cyber-informed Engineering (CCE)
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

’15CFAM’ is More than FUN with Consequence-driven Cyber-informed Engineering (CCE)

Author: Jennifer Walker

Created: Tuesday, October 13, 2020 - 17:48

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

Welcome to week two of ‘15 Cybersecurity Fundamentals Awareness Month’ (15CFAM), as WaterISAC continues its tribute to National Cybersecurity Awareness Month (NCSAM). Today we briefly touch on less of a fundamental and more of a slightly advanced topic called Consequence-driven Cyber-informed Engineering (CCE), which comes in at #6 (Install Independent Cyber-Physical Safety Systems) in the 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. Admittedly, not a lot has been discussed on this topic, but the experts at Idaho National Laboratory (INL) have done a lot of work and are the foremost authorities on the concept. Essentially, the CCE methodology aims to secure the nation’s critical infrastructure by limiting physical damage from skilled adversaries focused on sabotage. By applying CCE concepts, utilities engineer physical solutions to protect against the impact of cyber-sabotage resulting in a high-consequence event. Likewise, CCE solutions could also prove valuable for protecting against unintentional cyber incidents, like a sensor failure. For example, the dangerous overdosing of treatment chemicals can occur due to a cyber attack or a component failure. A potential CCE solution would be to carefully select a pump size that would significantly reduce the likelihood of an overdose.

If you can imagine a worst-case cyber threat scenario that could cause physical damage to Industrial Control System (ICS) equipment, so will the bad guys. By installing solutions to limit physical damage that could occur due to a cyber attack (or even an unintentional cyber incident/device failure), asset owners can significantly reduce the impact posed by dangerous conditions such as excessive levels of pressure or chemical additions. For more on the CCE methodology, including the four-step process, case studies, and a presentation overview, members are encouraged to visit the CCE page at INL.

While CCE could be construed as the ultimate in vulnerability management, check out the next Security & Resilience Update for a more holistic discussion on embracing vulnerability management programs.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar