Magazine

FM College ~ News & Articles

Keep Safety Systems Cyber Secure

Dec 12, 2022 | Public | 0 comments

Apply the same level of cybersecurity emphasis to safety systems that you integrate into assets and operations.

The primary goal of every industrial facility is a safe production environment. With plant safety in mind, the objective is to reduce safety and cybersecurity risks, which are inextricably linked. At its core, risk comprises two fundamental components: the likelihood or probability that an event will occur and the severity of post-incident consequences. Effectively reducing risks requires decreasing the likelihood and consequences of the risk equation to an acceptable level. 

Reducing safety risks, however, requires a different approach than reducing cybersecurity risks. To estimate safety risk, a plant uses the safety HAZOP and LOPA processes. These processes are much more mature when compared to the risk estimations for cybersecurity. However, when StuxNet (2010) and TRITON (2017) cybersecurity threats emerged, it showed that the process-safety function is not necessarily guaranteed during a cyberattack.

Today’s consensus from OT/ICS cybersecurity experts is that risks from a cyberattack need to be reduced to a level that ensures a plant will continue to run safely if and when a cyberattack occurs or, should downtime result, operations can safely resume within the recovery-time objective timeframe. Hence, it is always recommended that critical Safety Instrumented Systems (SIS) are secure. 

The best practices for securing SIS include four standard elements:

• centrally managing inventory and vulnerability for all safety systems
• creating a separate zone for safety systems
limiting communication to/from all safety systems
monitoring and logging the access/communications to them.

These practices improve the process/automation design and reduce the likelihood of a cyberattack. However, in some cases, the design cannot follow the best cybersecurity strategy to ensure the usability of other OT/ICS applications. In such cases, alternative cybersecurity controls need to be considered and applied to reduce cybersecurity risks to an acceptable level.

A nefarious actor, intent on causing damage or harm, may first disable the safety systems, then go after the data being sent to the control room. By changing this data, the attacker could very well cause the operator to make poor decisions and create potentially dangerous outcomes. Consequently, safety systems must be prioritized and secured. 

ICS cybersecurity best practices, such as in-depth inventory management, vulnerability management, and incident response, should be implemented. The ISA/IEC 62443 industry standard recommends that the inventory include all the hardware, firmware, and software versions that are implemented in the OT/ICS network. The vulnerability-management solution should include details such as the probability of remote exploitation, skills to exploit, CVSS scores augmented with environmental and temporal impact factors, and methodology for mitigating them. 

The assumption that a plant will be a target of a cyberattack should always be part of the cybersecurity strategy. The automation/safety team should be trained to detect a cyberattack at an early stage. With time, cyberattacks cause more damage. The automation/safety team should identify all the changes and know what is normal and abnormal, and report to the incident management team accordingly. 

Securing an OT/ICS network is a journey. As a plant becomes more mature, the recommendations will change. It is suggested to conduct a maturity assessment to identify the status and apply cybersecurity controls on a regular basis as new vulnerabilities and threats emerge. EP

By Syed Belal, Hexagon AB

Syed M. Belal is Global Director of Cybersecurity Consulting for Hexagon’s Asset Lifecycle Intelligence division. Hexagon AB, Stockholm, Sweden (hexagon.com), is a member organization of the International Society of Automation’s (ISA) Global Cybersecurity Alliance (ISAGCA). Belal has more than 15 years of experience in industrial control systems and operational technology. 

The post Keep Safety Systems Cyber Secure appeared first on Efficient Plant.

The post "Keep Safety Systems Cyber Secure" appeared first on Efficient Plant

0 Comments

Submit a Comment

Facilities Going ‘Big’ with Data Centers

As AI use continues to expand, demand for data centers continues to grow at a rapid rate. Big data means big business for...

Geisinger to Build $32 Million Cancer Center in Pennsylvania

The two-story, 40,000-square-foot facility will be home to the cancer center with space for future growth of services....

Remanufacturing 101: Reviving parts, reclaiming value

Remanufacturing, the process of restoring used parts to give them a second life, has been propelled into the spotlight in...

Burnaby rec centre transcends dated ice arenas 

Windowless cold arenas are a thing of the past at the newly opened Rosemary Brown Recreation Centre in Burnaby, B.C. Inside...

Building your leadership pipeline: the crucial role of confidence

You are looking to build your leadership pipeline and are considering two people to put on the path to higher levels of...