11/12/2025 | News release | Distributed by Public on 11/12/2025 05:31
We've seen in the past two Bulletins that control system cybersecurity is the black sheep of IT, a hard-to-change tanker's course. Still, with significant daily damage of 250 000 USD for ALMA, the costs of falling to a cyberattack can no longer be ignored by any accelerator laboratory or experiment collaboration. A paradigm change has come about in the past decade - slowly, but constantly, and still too slowly compared to the speed with which information technologies advance and attackers adapt.
While a comprehensive guide to implementing and deploying a full-fledged, sophisticated and thorough cybersecurity programme is beyond the scope of this article, a series of first steps can be recommended:
In fact, CERN IT and OT (operational technology, i.e. our accelerator, experiment and infrastructure control and safety systems) already follow the guidelines above, implementing them as thoroughly and completely as possible. For a good reason: black swans.
The world lives in a symbiosis between control and IT systems, taking advantage of its benefits but also suffering from its drawbacks. Similarly, accelerator and large experimental physics control systems embrace modern IT technologies for more precise control loops and quicker processing, faster development and improved maintenance, and/or cost and resource savings. But that makes them susceptible to the common cybersecurity threats to which "normal" IT systems are subject, as devastating successful incidents in the past have shown.
Therefore, now more than ever, control system experts, developers and ultimately the people responsible for operating and running accelerator and experiment control systems must (start to) further invest in the cybersecurity of their installations, embrace good practices and standards, analyse the residual risks, and either sponsor their mitigation or consciously accept them. This is to avoid greater damage, as the question is not if they will fall to a cybersecurity attack but when. Do we want to act before or after such an incident?
This is an abridged version of an article that first appeared in the proceedings of the ICALEPCS 2025 conference.
________
Do you want to learn more about computer security incidents and issues at CERN? Follow our Monthly Report. For further information, questions or help, check our website or contact us at [email protected].