Cybersecurity in manufacturing: How much is needed?

The cybersecurity situation for manufacturing is changing as the scale of attacks on the manufacturing sector and proportional loss to businesses has demonstrated the necessity of secure integrated control systems.

06/18/2016


In your day-to-day routine, how focused are you on topics of cybersecurity? Do you follow exploits published by SANS, ICS-CERT, etc and relish in unique zero-day findings? Or, do you passively hear of hacks on the news and think, "I'm glad that wasn't my company."

For most of us, the answer would be the latter. However, the scale of attacks on the manufacturing sector and proportional loss to businesses in recent years has demonstrated the necessity of secure integrated control systems (ICSs).

The constantly shifting threat landscape can be daunting to follow—and it shows—in fact, the 2016 Vormetric Data Threat Report states that, "64% of IT execs think achieving basic compliance will stop most breaches." With the increasing nation-state threat, breaches are becoming more sophisticated and creating advanced persistent threats (APTs) with new levels of potency.

The "script-kiddies" of yesterday, taking advantage of single exploits, have grown up to become a highly trained, educated, and government-sponsored team of professionals. This team is dedicated to stealing a target's intellectual property (IP) and/or using that company's weaknesses to damage an entire industry. The scale is massive, and the threat is real.

The cybersecurity situation for manufacturing is changing as the scale of attacks on the manufacturing sector and proportional loss to businesses has demonstrated the necessity of secure integrated control systems. Courtesy: MESA InternationalAmidst the growing and changing attacks on the cyber front, many of the fundamentals have not changed. It is still true that most exploited vulnerabilities—99% in fact, according to Verizon's 2015 Data Breach Investigations Report (DIBR) —came over a year after that exploit had been discovered and patched. The importance of patching will continue to be critical to a secure infrastructure.

The cybersecurity threat landscape

A coming of age of the cybersecurity threat landscape can be shown not only through the scale of attacks, but also through attackers' focus, complexity, and funding. The situation is changing and the sophistication of these attacks, such as the one that hit Saudi Aramco, is evolving in ways that hadn't been anticipated.

One of the key points of the Saudi Aramco breach was the company's ability to quickly disconnect its systems (physically) from each other and the Internet. Financial and business systems went down and nobody got paid. However, manufacturing operations such as legacy oil manufacturing, continued to function.

What happens when these manufacturing systems inevitably become a connected integrated computer system (ICS) through business drivers for key performance indicator (KPI) monitoring, scheduling, resourcing, Industrial Internet of Things (IIoT), or other drivers? What happens to the oil company whose manufacturing infrastructure is wiped by an attack of this scale? What happens to a global manufacturing company that can no longer produce any product?

That is the question many companies and organizations devoted to cybersecurity are looking to answer. And some of the best solutions can come from those who work in the trenches and see what is happening on a day-to-day basis.

Chris Hamilton is a senior technical consultant, manufactuing IT/OT, Grantek Systems Integration. He is also a MESA cybersecurity working group member. Courtesy: MESA InternationalChris Hamilton is a senior technical consultant, manufactuing IT/OT, Grantek Systems Integration. He is also a MESA cybersecurity working group member. This article originally appeared on MESA International's blog. MESA International is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media, cvavra@cfemedia.com.

ONLINE extra

See additional stories about cybersecurity linked below.

References

Barth, Bradley. "Survey 64 Percent of IT Execs Think Achieving Basic Compliance Will Stop Most Breaches." SC Magazine. SC Magazine, 22 Jan. 2016. Web. 28 Jan. 2016.

Bekker, Garrett. "2016 VORMETRIC DATA THREAT REPORT." VORMETRIC DATA THREAT (2016): n. pag. VORMETRIC. Web.

"2015 Data Breach Investigations Report (DBIR)." Verizon Enterprise Solutions. N.p., n.d. Web. 28 Jan. 2016.

Rashid, Fahmida Y. "Inside The Aftermath Of The Saudi Aramco Breach." Dark Reading. N.p., n.d. Web. 28 Jan. 2016.

Hulett, Marguerite. "Cybersecurity: Changing Threat Landscape."



Top Plant
The Top Plant program honors outstanding manufacturing facilities in North America.
Product of the Year
The Product of the Year program recognizes products newly released in the manufacturing industries.
System Integrator of the Year
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
June 2018
2018 Lubrication Guide, Motor and maintenance management, Control system migration
May 2018
Electrical standards, robots and Lean manufacturing, and how an aluminum packaging plant is helping community growth.
April 2018
2017 Product of the Year winners, retrofitting a press, IMTS and Hannover Messe preview, natural refrigerants, testing steam traps
June 2018
Machine learning, produced water benefits, programming cavity pumps
April 2018
ROVs, rigs, and the real time; wellsite valve manifolds; AI on a chip; analytics use for pipelines
February 2018
Focus on power systems, process safety, electrical and power systems, edge computing in the oil & gas industry
Spring 2018
Burners for heat-treating furnaces, CHP, dryers, gas humidification, and more
April 2018
Implementing a DCS, stepper motors, intelligent motion control, remote monitoring of irrigation systems
February 2018
Setting internal automation standards

Annual Salary Survey

After two years of economic concerns, manufacturing leaders once again have homed in on the single biggest issue facing their operations:

It's the workers—or more specifically, the lack of workers.

The 2017 Plant Engineering Salary Survey looks at not just what plant managers make, but what they think. As they look across their plants today, plant managers say they don’t have the operational depth to take on the new technologies and new challenges of global manufacturing.

Read more: 2017 Salary Survey

The Maintenance and Reliability Coach's blog
Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
One Voice for Manufacturing
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Maintenance and Reliability Professionals Blog
The Society for Maintenance and Reliability Professionals an organization devoted...
Machine Safety
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
Research Analyst Blog
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Marshall on Maintenance
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
Lachance on CMMS
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
Electrical Safety Update
This digital report explains how plant engineers need to take greater care when it comes to electrical safety incidents on the plant floor.
Maintenance & Safety
The maintenance journey has been a long, slow trek for most manufacturers and has gone from preventive maintenance to predictive maintenance.
IIoT: Machines, Equipment, & Asset Management
Articles in this digital report highlight technologies that enable Industrial Internet of Things, IIoT-related products and strategies.
Randy Steele
Maintenance Manager; California Oils Corp.
Matthew J. Woo, PE, RCDD, LEED AP BD+C
Associate, Electrical Engineering; Wood Harbinger
Randy Oliver
Control Systems Engineer; Robert Bosch Corp.
Data Centers: Impacts of Climate and Cooling Technology
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
Safety First: Arc Flash 101
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
Critical Power: Hospital Electrical Systems
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me