Honeywell User Group: Understand risk

No industrial control system can ever be 100% secure, that is a given, but a manufacturer has to understand the threat and know how far they want to go and still remain confident they can withstand the inevitable attack.

11/26/2013


No industrial control system can ever be 100% secure, that is a given, but a manufacturer has to understand the threat and know how far they want to go and still remain confident they can withstand the inevitable attack.

“Cyber security is all about risk,” said Sinclair Koelemij, technical team lead Open Systems Services EMEA at Honeywell Process Solutions during his talk on designing a secure industrial control system at the 2013 Honeywell User Group (HUG) EMEA in Nice, France. “You have to decide at what level you want to be.”

“Defense for critical infrastructure needs to be more protected than it was 10 years ago,” Koelemij said. “We have seen some drastic changes; for the first time malicious code was used to attack an (industrial control system).” While attacks of late have not caused heavy damage, they have been more stealthy in trying to steal intellectual property, Koelemij added one of the bigger hits came last August when a virus called Shamoon hit Saudi Aramco and wiped out at least 30,000 hard drives. “Shamoon just wanted to attack and do as much damage as possible.”

He added another type of attack has also inflicted damage and that is a ransomware attack. That is when a virus gets on a computer and locks the system and demands a payment to unlock the computer. If a victim does pay, oftentimes, the bad guy does not “fix” the system.

In short, Koelemij said malware can:

  • Reduce system performance
  • Create a loss of view or information
  • Be a production disruption
  • End up being costly to remove an infected system
  • Lead to a loss of intellectual property.

That is why manufacturers have to understand what they are trying to protect and know what the risk is before they start or refresh a security program.

Security, Koelemij said, can end up measured on impact to safety, people, finance and brand name. Part of that is identifying risk, and then protect, detect, respond and then have a plan to recover.

“You have to decide on your risk appetite,” he said. In the protect mode, the user needs to determine what technologies they want to employ, like firewalls, antivirus, or whitelisting to name a few.

They then have to come up with a response plant. “You need to take action. If you are sitting with your arms crossed until the attack is over, then you are too late,” he said. “If you don’t respond very quickly the damage will end up much bigger.”

“The golden rule in security is if the time to breach the protection is greater than the time to detect the event plus the time to respond to the event, then your plant is secure.”

To achieve that golden rule, users need to work in technical controls like antivirus, firewalls, application whitelisting, intrusion prevention systems, domain controllers, intrusion detection systems. Those technical controls will help achieve safety assurance levels.

There are also non technical controls like policies, procedures, security incident response, and risk management, which are more the maturity levels.

Knowing what type of attacker could hit you can determine your security level. The ISA99/IEC 62443 security standard defines security levels.

  1. Security level 1 (SL1) is something that happens by chance, a very low level type of attack
  2. Security level 2 (SL2) is protection against intentional security incidents.
  3. Security level 3 (SL3) is protection against a targeted attack like the Shamoon virus.
  4. Security level 4 (SL4) protects against intentional security incidents using sophisticated means. This would be more of a nation-state attack like Stuxnet, which struck and damaged a nuclear enrichment facility in Natanz, Iran.

Generally, non critical manufacturing operates at security level 2, while critical infrastructure is usually between levels 3 and 4, Koelemij said. Oil and gas, power, and water facilities are usually at security level 3, he said.

But it isn’t all about the technical side as you also have to look at what processes are in place to help ward off attackers.

That is when you look at which maturity level the manufacturer is at. That range goes from maturity level 1 up to maturity level 4. Maturity level 1 is where the user is practicing security, but has no real plan formulated, where ML4 has a solid plan in place where there are plenty of policies and procedures in place.

“So, far I have not seen a maturity level 4 in real life,” Koelemij said. “In our security assessments, most companies score between SL1 and SL2. I have seen companies that are really protected, but they are rare.”



No comments
The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
IIoT grows up; Six ways to lower IIoT costs; Six mobile safety strategies; 2017 Salary Survey
2016 Top Plant; 2016 Best Practices on manufacturing progress, efficiency, safety
2016 Product of the Year; Diagnose bearing failures; Asset performance management; Testing dust collector performance measures
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Big Data and bigger solutions; Tablet technologies; SCADA developments
SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
What controller fits your application; Permanent magnet motors; Chemical manufacturer tames alarm management; Taking steps in a new direction
Tying a microgrid to the smart grid; Paralleling generator systems; Previewing NEC 2017 changes
Package boilers; Natural gas infrared heating; Thermal treasure; Standby generation; Natural gas supports green efforts

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
Motion control advances and solutions can help with machine control, automated control on assembly lines, integration of robotics and automation, and machine safety.
This article collection contains several articles on the vital role of plant safety and offers advice on best practices.
This article collection contains several articles on preventing compressed air leaks and centrifugal air compressor basics and best practices for the "fifth utility" in manufacturing plants.
Maintenance Manager; California Oils Corp.
Associate, Electrical Engineering; Wood Harbinger
Control Systems Engineer; Robert Bosch Corp.
click me