There is a lack of adequate engineering considerations for cyber security of control systems

March 25, 2018

Good engineering principles and practices have been neglected when it comes to control system cyber security that not only affects cyber security but also safety. How can you perform a nuclear or non-nuclear (HazOp) safety analyses if you haven't adequately addressed the cyber-induced system interactions and cyber security at all Purdue Reference Model levels including Level 0,1 devices?

There are millions of installed Purdue Reference Model Level 0,1 field devices (e.g., process sensors, actuators, and drives) and networks in field installations in process control, manufacturing, commercial buildings, and defense applications. Many of these devices and networks serve critical control and safety applications. However, many of these field devices and networks do not meet the defined cyber security requirements in standards such as IEC62443-4-2 - Security for Industrial Automation and Control Systems – Technical security requirements for IACS components. In general, these devices and networks cannot be upgraded to meet the cyber security requirements easily, if at all, including for IOT and Industrie4.0 applications. As a result, ISA99 formed a new Task Group, 99.04WG4TG7, to address the Purdue Reference Model Level 0,1 devices as there is inadequate cyber security guidance. What has been evident since the initial meetings of the Task Group is there is still a lack of understanding by many of what makes these field devices and associated networks unique from a cyber security perspective. Beyond the Level 0,1 considerations, there is a need to address the cyber security of the entire control loop from sensors/analyzers, to controllers, to HMIs (and associated Ethernet networks), to final elements (actuators) - the SYSTEM.  However, I believe the cyber security focus in IEC62443-4-2 and other industry standards (ISA, IEEE, CIGRE, and others) has been on the network, not the SYSTEM. There have been control system cyber incidents affecting each of part of the control SYSTEM including unintended/unexpected system interactions. Level 0,1 is an issue, but not the only issue. The IT mantra is the system is only as secure as the weakest link. Yet, too many people continue to ignore the control system weak links if they are not Ethernet network-related. Consequently, I believe good engineering principles and practices have been neglected when it comes to control system cyber security that not only affects cyber security but also safety. How can you perform a nuclear or non-nuclear (HazOp) safety analyses if you haven't adequately addressed the cyber-induced system interactions and cyber security at all Purdue Reference Model levels including Level 0,1 devices?

Joe Weiss

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...