Ensuring plant security without compromising open technology

Use of Ethernet from top-to-shop floor and demand for global access to real-time production data has created the need to implement a security methodology and new security policies. A mere minute of production downtime can translate to the loss of thousands of dollars. But what if your manufacturing systems were hacked and shut down for an entire day? The focus on system security has also been g...


Key Concepts
  • The evolution from proprietary to open system architectures is introducing the plant floor to security risks.

  • Today's production processes are tightly coupled with up-stream and down- stream supply chain elements.

  • An organization's security methodology should begin by defining what it wants to protect.

    Open operation means increased risk
    Security methodology defines security needs
    Situation analysis
    Support and maintenance



    Use of Ethernet from top-to-shop floor and demand for global access to real-time production data has created the need to implement a security methodology and new security policies.


    A mere minute of production downtime can translate to the loss of thousands of dollars. But what if your manufacturing systems were hacked and shut down for an entire day? The focus on system security has also been growing due to the steady stream of e-mail attacks.


    While most breaches have affected the office environment, the evolution from proprietary to open system architectures is introducing the plant floor to similar risks. According to the Computer Security Institute, the cost of network intrusions for the average company has doubled in the past year (from $976,000 in 2000 to $1,928,000 in 2001 (Fig. 1). The costs of security leaks have also doubled from $67 million in 2000 to $151 million in 2001 (Fig. 2).



    Fig. 1. (Above left) The cost of network intrusions has doubled in the past year, from $976,000 in 2000 to $1,928,000 in 2001.


    Fig. 2. (Above right) The cost of security leaks has doubled from $67 million in 2000 to $151 million in 2001.


    These costs are significant, but the cost of a single security breach could be much higher for the plant floor since assets include more than just business information; they include the manufacturing processes, facilities, equipment, and people.


    What if your production recipe was stolen?


    What if a cutting machine was shutdown for routine maintenance, then an offsite engineer accesses the process control network via the intranet, monitors the nonfunctioning machine, and selects to activate it?


    What if an engineer were to enter the wrong IP address, causing a valve to open, thereby emitting a toxic gas?


    Open operation means increased risk

    Historically, manufacturing was viewed as an island isolated from other elements within the supply chain. In fact, great care was taken to decouple manufacturing from the risks of supplier shortages and demand fluctuations from customers. While simple to build, this model was both inefficient and unresponsive. End users were unable to exchange data with business systems, and communication was segregated throughout the plant.


    Today's production processes are tightly coupled with both upstream and downstream elements within the supply chain. The advantages include both productivity and flexibility improvements, with build-to-order, predictive maintenance, and e-procurement capabilities for MRO supplies being just a few of the programs that can be implemented.


    As data from the factory floor becomes more important for daily and real-time business decisions, end users need to take the proper steps to secure these data. This helps ensure that the benefits of a seamless supply chain outweigh the risk and exposure to information security breaches.


    Ethernet has played a key role in creating today's tightly coupled manufacturing enterprise. To its credit, Ethernet has many benefits, such as availability, familiarity, and cost. These advantages have made it a popular choice for a wide range of industrial applications. But there are two major aspects to consider — interoperability and security — when using Ethernet in industrial control applications.


    Transmission control protocol/internet protocol (TCP/IP) is the network and transport-layer protocol of the internet and is commonly linked with Ethernet in the business world. The TCP/IP protocol suite provides a set of services that two devices may use to communicate with each other over an Ethernet local area network (LAN) or over a wide area network (WAN) that spans the globe.


    However, using TCP/IP alone does not guarantee that two devices can communicate effectively, if at all. It only guarantees that application-level messages will be successfully transferred between the two devices. For interoperability, a common, open Ethernet stack such as EtherNet/IP is needed to guarantee data exchange with I/O control capability between two Ethernet devices.


    As for the security issue, care must be taken when designing and installing an Ethernet network on the plant floor. Ethernet TCP/IP has a bright future in industrial automation applications. However, it is imperative to secure the plant floor from both external and internal intrusions. Consistently applying a security methodology is one way to minimize the risk attached to open technologies.


    Security methodology defines security needs

    An organization's security methodology should begin by defining what it wants to protect. In many cases, this includes hard assets, such as the manufacturing process, production equipment, manufacturing facilities, raw material inventory, finished product inventory, personnel safety, and environmental protection.


    But it also includes soft assets, such as production schedules, production rates, capacity, yield, customer information, process conditions, set points, product specifications, recipes, operating procedures, and quality data.


    While there is more than one way to address an organization's security issues, a security methodology that includes four basic steps — situation analysis, design, implementation, and support/maintenance — is recommended (Fig. 3).



    Fig. 3. This block diagram shows a typical LAN security methodology. Devices connected to the plant floor Ethernet are protected by multiple LAN layers and firewalls.


    Situation analysis


    After defining assets, the situation analysis phase involves reviewing an organization's existing security policies, soliciting participation from stakeholders, understanding the functional objectives, understanding threats, analyzing risk, and educating employees.


    In a typical application, the three main threats are:


    • People from inside the process control network who are trying to access remote resources via the internet, extranet, or intranet.

    • People outside the process control network who are trying to access the process control network via the internet, extranet, or intranet.

    • The physical connections between the process control network and external networks.

      • Design

        During the design phase, end users will select migration strategies based on the risk analysis performed in the earlier phase. Antivirus software is the most widely used protection strategy (with nearly 100% of all PCs having antivirus protection). Firewalls, which are coming down in price ($500-$10,000 each, depending on functionality), are also very popular.

        A typical architecture places firewalls between the internet and the business level network. Since communication between the business systems and the process networks is often based on Ethernet, the question is frequently raised about whether a firewall is needed between these two levels. Regardless of placement, a common mistake is thinking that firewalls are all that is necessary to protect a system. A secure system requires much more. Strict access control procedures, such as a two-way user authentication (for example, a password plus PIN number), are recommended. Security may also involve virtual/private networks (VPNs) for remote access, data encryption, digital certificates, intrusion detection software, or using a separate, redundant network for process control.

        Another aspect to plant security involves a focus on inside intrusions, which cause 50% of all security breaches. Inside intrusions could be the result of a disgruntled employee, but more often than not, they are unintentional.

        For example, let's say a company provides remote access to the process control network. One wrong keystroke could change an IP address, and consequently alter the parameters of the wrong machine or device. Another inside intrusion could be caused by an attempt to change the recipe at one plant, but inadvertently changing the recipe in another plant. This is especially possible if the intranet does not provide clear location paths.

        It's enticing to think about being able to sit in a remote office or the comfort of your home and control the plant. But access to setpoints and equipment controls must be protected by multiple security mechanisms in a LAN or WAN.

        If the risk is too great, remote access should be limited to monitoring, advising, modeling, and undertaking what-if analysis on information — not direct interaction with the control environment.


        The implementation phase involves applying the hardware and software solutions selected during the design phase. Integral to a successful implementation is the understanding of your process and the needed application functionality identified during the design phase. Firewalls offer many features, which need to be carefully selected and configured by trained personnel with security implementation experience.

        Support and maintenance

        As the end user begins the supporting and maintaining phase, the most crucial step involves access control. Reusable authorization codes are a common area of concern. Also important are routine updates to the organization's policies, vulnerability analysis, disaster recovery plans, and intrusion detection software. New employees should also be kept up-to-date about their security roles and responsibilities.


        Ethernet and other open networking and computing technologies continue to achieve acceptance in manufacturing environments, with real cost and productivity gains for the user. Unfortunately, along with the benefits come the vulnerabilities we've all experienced in the office environment. Keeping the destructive elements away from your valuable manufacturing assets requires a well-planned, well-executed security information methodology.

        Edited by Jack Smith, Senior Editor, 630-288-8783, jsmith@reedbusiness.com

        More Info

        The author is available to answer questions about this article. He can be reached by phone at 440-646-3105, or by e-mail at asomogyi@ra.rockwell.com .

    The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
    The Product of the Year program recognizes products newly released in the manufacturing industries.
    Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
    Pipe fabrication and IIoT; 2017 Product of the Year finalists
    The future of electrical safety; Four keys to RPM success; Picking the right weld fume option
    A new approach to the Skills Gap; Community colleges may hold the key for manufacturing; 2017 Engineering Leaders Under 40
    Control room technology innovation; Practical approaches to corrosion protection; Pipeline regulator revises quality programs
    The cloud, mobility, and remote operations; SCADA and contextual mobility; Custom UPS empowering a secure pipeline
    Infrastructure for natural gas expansion; Artificial lift methods; Disruptive technology and fugitive gas emissions
    Power system design for high-performance buildings; mitigating arc flash hazards
    VFDs improving motion control applications; Powering automation and IIoT wirelessly; Connecting the dots
    Natural gas engines; New applications for fuel cells; Large engines become more efficient; Extending boiler life

    Annual Salary Survey

    Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

    There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

    But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

    Read more: 2015 Salary Survey

    Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
    The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
    The Society for Maintenance and Reliability Professionals an organization devoted...
    Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
    IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
    Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
    The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
    The maintenance journey has been a long, slow trek for most manufacturers and has gone from preventive maintenance to predictive maintenance.
    This digital report explains how plant engineers and subject matter experts (SME) need support for time series data and its many challenges.
    This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
    Maintenance Manager; California Oils Corp.
    Associate, Electrical Engineering; Wood Harbinger
    Control Systems Engineer; Robert Bosch Corp.
    This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
    This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
    This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
    click me