8dc4f8cc-1ed1-488f-9d6b-f1b3af761c45

Why cybersecurity cannot be overlooked

Oct. 21, 2015
Effective cybersecurity requires ceaseless monitoring and evaluation of network data and traffic to identify and head off evolving intrusions and potential attacks, but improved tools are making it simpler and easier.

Security isn't a barrier. Security is awareness.

But it's hard to get out of that old barrier mindset. After all, people have been hiding in caves, huts and castles, and behind shields, fences, walls and locked doors for a long time. The desire is always to get behind the barrier where you can breathe easy.

However, that's not how cybersecurity works. Today's probes, intrusions and attacks are directed by software, travel via increasingly widespread Ethernet networks aided by Internet protocol (IP), and can run on all kinds of computers that are always up and running—so they must be continuously sought and eradicated in the same way.

"You can put firewalls between the plant floor, IT/business level and other functional areas that define the traffic allowed between them, but then you have to monitor that only the right data gets through in the right way, and that means using the firewall's whitelisting functions to define specifically what data sources and destinations are allowed," says Chuck Tommey, PE, business development manager at A&E Engineering, a CSIA-member system integrator in Greer, S.C. "If there's unusual traffic, whitelisting can monitor it, not just at the firewall level, but down to the PC level, too. Then, IT can call application control, take an inventory of all the files and executables on the PC as it's running, quickly give signatures only to those allow to run, and not allow them to be modified.

"Unlike typical antivirus software that's reactive, and blacklisting that just blocks known bad actors and must be constantly updating, whitelisting doesn't need to repeatedly download new versions, apply patches, and conduct virus scans. When whitelisting software is updated, new signatures are needed for applicable files, and this does require some effort, but IT has been using these tools for a long time, and the plant can use them, too. In fact, today's plants look a lot like IT departments with all their servers, credentialing and software files, but this means they can also use newer tools like security information and event management (SIEM), which sorts monitoring log files from firewalls, switches with routing functions and PCs, looks for any unauthorized activity, and alerts the administrators."

Neil Peterson, DeltaV product marketing director at Emerson Process Management, adds, "There's no silver bullet for cybersecurity. Everyone want's a secure solution, and it's possible to make process control systems stronger, more secure and greatly reduce risks, but there are no guarantees. So, cybersecurity assessments, risk prioritization, firewalls and antivirus software, network segmentation, whitelisting and constant monitoring are crucial. Tools like SIEM can show all networking monitoring in a central display, and look for anomalies in how the network is supposed to be working. Users can then write rules for good or bad behaviors in their networks. This is very doable for steady-state process applications."

Vulnerabilities and vectors

Today's stressful cybersecurity environment evolved from IT-based computing and networking, which historically sent and received data from all devices on their networks, and tried to put a lid on afterwards. At first glance, the new and expanding Internet of Things (IoT) and Industrial IoT (IIoT) just mean more pervasive networking, which means "larger attack surfaces" and "more attack vectors"—in short, larger targets and more places for bad guys to shoot from. The predictable result has been a stream of mainstream and a few industrial breaches, most recently at Target department stores, at least two U.S. government agencies, an unnamed German steelmaker last year, a demonstrated hack of Jeep's on-board automotive systems, and who knows how many undisclosed events.

Germany's Federal Office for Information Security (BSI) reported in December, 2014, that staff at a steel mill were subjected to a targeted-email, or spear phishing, attack that reportedly tricked recipients into opening an attachment or visiting a website that downloaded malware. This code then penetrated and compromised many of the mill's corporate and production systems, and even prevented the shutdown of a boiler and blast furnace, causing severe damage. This was the first well-known disclosure of malware causing physical, plant-floor damage since 2010, when Stuxnet was found to have damaged uranium centrifuges in Iran. (A report by the SANS Institute on the attack can be accessed here.)

"The German steel mill incident and the stream of vulnerabilities discovered in the OpenSSL library, including Heartbleed and others that received less public attention, or the Poodle vulnerability in certain common configurations of SSL/TLS stacks, have had a significant impact on the industrial control systems (ICS) community," says Ragnar Schierholz, head of cybersecurity for ABB's process automation division. "All these events and discoveries remind us that we can't rest on achievements we've made, but must stay constantly alert, and proactively look for possibilities to improve the cybersecurity posture of our ICS products and installations.

"The trend of increased attention to the ICS domain in the hacker communities continues. Flagship hacker conferences such as BlackHat or DefCon rarely go without talks and demos where security researchers describe new approaches to hacking ICSs. These aren't just using newly discovered vulnerabilities, but are rather inventing new attack strategies and approaches. For example, work by Alexander Bolshev and Alexander Malinovsky looks at first like yet another hacker manipulating industrial field-level protocols—in this case HART. However, at a second look, one realizes it's actually a radically new attack strategy. Instead of the usual top-down approach from the Internet into the target organization's office to the industrial control system, Bolshev and Malinovsky go bottom-up, and attach to the field-level networks, compromise workstations connected to the field devices, and work their way up to the ICS or even the office environment and enterprise. This circumvents the most common layers of defense-in-depth architectures, which assume that attacks come top-down, and assume that the inner core of the system is trustworthy."

Beyond basic services

Once passwords are updated, ports are closed, the network is segmented and firewalled, traffic is encrypted, new tools are applied and staff is trained in basic security practices, what's next? Well, it's time to reassess, seek more vulnerabilities and protections, and resume seeking to make the odds of a successful intrusion and attack ever smaller.

For instance, one of Boliden's mining and smelting plants in Sweden already had a cybersecurity program for its System 800xA control system, but managers recently wanted to augment it with a fresh perspective, so they initiated ABB's multi-layered Cyber Security Fingerprint program to validate the plant's existing security policies, find new areas they hadn't considered, and supplement their efforts to prevent unauthorized access and mitigate computer viruses (Figure 1). The fingerprint service collected data from more than 100 points in the plant's control system, conducted in-depth interviews with Boliden personnel, and used software-based analysis to compare its performance with industry standards and best practices. It also helped the plant add protection layers to its 800xA system, and Boliden's staff reports it gave them greater confidence in their cybersecurity program and increased their knowledge about proactively preventing breaches.

In the Zones

Figure 2: The ISA99, now IEC 62443, standard directs users to achieve defense-in-depth by further dividing their process control networks and sub-networks into zones with common functions, and link them with conduits guarded by managed Ethernet switches servings as firewalls, such as Belden's Tofino security modules.      
Credit: Belden

"The Cyber Security Fingerprint should give enough of an overview to point out the biggest risks," adds Schierholz. "Such an overview should include the operational setup, such as policies and procedures, roles and responsibilities, as well as the technical solution as deployed, such as an inventory of network nodes, installed software versions, security updates, active user accounts, OS and application configurations, network configuration, etc.

"The documented as-is overview can then be compared to a recommended should-be status—commonly referred to as the configuration baseline, which should be available from the system integrator or ICS vendor. The resulting deviations should be assessed for impact in light of the specific application context and then countermeasures for the biggest risks should be designed and implemented. A more mature organization will already have an inventory, and should continuously monitor the operation in accordance to defined policies and procedures, such as timely deployment of qualified security updates, continuously control access including revocation of obsolete access permissions, and continuously monitor the threat landscape to adapt countermeasures to new, evolving threats."

Likewise, Emerson has developed a portfolio of cybersecurity services to help its Ovation control system users in the power generation industry secure their assets and meet compliance rules like NERC-CIP. These services include annual cybersecurity assessments, vulnerability identification and suggested remedies; scheduled deployment of patches and antivirus definitions, backup verification and preventive maintenance; assistance in creating, evaluating and implementing security and compliance programs; customized fleet service for single or multiple locations; and an incident response service for emergencies, which provides root-causes analyses, recovery and system hardening functions.

Similarly, Honeywell Process Solutions recently launched its Industrial Cyber Security Risk Manager, which is a digital dashboard designed to proactively monitor, measure and manage cybersecurity risks for process control systems within and across all security zones of a plant, including third-party systems. By understanding security zones, it's aligned with ISA 62443 and can calculate accurate risk scores. It translates cybersecurity indicators into measurements and key performance indicators (KPIs), while its intuitive workflow allows users to create customized, risk-notification alerts, and perform threat and vulnerability analyses, so they can focus on managing risks for reliable plant operations.

"It's still very useful to think of cybersecurity like process safety: ask what are the consequences if a system gets compromised; perform risk assessments with frequency and severity; decide which consequences are acceptable and which are not; and limit them to acceptable levels," adds Mike Baldi, cybersecurity solutions architect at Honeywell. "After setting up sufficient firewalls and monitoring, it's also important to have a site incident response plan (SIRP), including an isolation strategy for how to disconnect when a breach occurs, an approval plan for who can act when a incident happens, a team that can assess and do recovery, and a schedule for practicing the SIRP in the plant."

Josh Carlson, systems cybersecurity manager for North America at Schneider Electric, agrees, saying, "The same dots can be connected with cybersecurity as with process safety, but users also need to go beyond DMZs and segmenting their networks, and broaden their security scope to include outside engineers, contractors, vendors and components coming in. Stuxnet and its descendants are just messengers because, when they're plugged in and connect to the Internet, they pull down malware. This is going to happen a lot more in the future, and so staffers must be trained and given the tools to handle these threats."

To offer improved device security, Schneider Electric recently gained ISASecure Embedded Device Security Assurance (EDSA) certification for its Field Control Processor (FCP) 280 from the ISA Security Compliance Institute. FCP 280 is a distributed, optionally fault-tolerant, field-mounted process controller with alarming functions for Schneider’s Foxboro Evo process automation system.

Likewise, Tony Baker, security platform leader at Rockwell Automation, reports that it and Cisco recently added design guidance and validated functions to their Converged Plantwide Ethernet (CPwE) architectures to address constantly changing security practices. The new CPwE architectures leverage open industry standards, such as IEC 62443, and are accompanied by a whitepaper summarizing key design principles. They include "Industrial Demilitarized Zone Design and Implementation Guide," which provides guidance on securely sharing data from the plant floor through the enterprise, and "Identity Services Design and Implementation Guide," which introduces an approach to security policy enforcement that tightly controls access by anyone inside the plant, whether they’re trying to connect via wired or wireless access.

Better remedies for deeper defenses

Fortunately, stronger and simpler cybersecurity software and hardware tools appear to be multiplying lately, enabling users to effectively protect their applications and facilities more quickly and with fewer headaches.

For example, Bedrock Automation has developed a universal, open-source ICS with an electromagnetic backplane architecture, software-configured universal analog and discrete I/O, and embedded cybersecurity. Its redundant controllers run a SIL-certified RTOS, redundant smart power supplies and single/dual/triple I/O. All system modules interconnect on a patented electromagnetic backplane, which eliminates I/O pins, providing a new level of reliability, availability and performance. Its embedded Black Fabric Cybershield uses patented processor, memory, communications, interconnections, backplane and packaging to integrate security into every module.

"Bedrock's controller is easier to apply because it has built-in, galvanic isolation and isolation channels, so it doesn't need added relays. It can also can take care of its own encryption via OPC UA, too, because its backplane won't accept counterfeit modules," says Dee Brown, principal at Brown Engineers LLC in Little Rock, Ark., an electrical, mechanical and system engineering firm that focuses on water, wastewater, power distribution, critical power and security projects. "We're looking to add it to three or four utility customers. They want to control security functions from their iPads and control centers because their networks are getting hammered every day by probes and attempted intrusions, and this controller will give them another layer of protection beyond their firewalls and VPNs. At the hardware level, it powers up and checks for validated hardware. At the operating systems level, it checks that valid programs are running. All of these have to be OK for the controller to operate. Regular PLCs don't do this."

One of the primary trends fueling development of these new cybersecurity solutions is the increasing convergence of IT and operations technology (OT), according to Bill Mueller, senior project engineer at Banks Integration Group, a life sciences-focused, CSIA-member system integrator in Vacaville, Calif. "For instance, Cisco and Rockwell Automation’s partnership has produced familiar switching gear with several functions typical of enterprise-level network gear. In the past, segmentation and network isolation were accomplished with two network cards, two switches and separate subnets. With the newer switch gear, we can get similar results with half the hardware. Also, configuration wizards built in to the switches provide easy setup of virtual local area networks (VLANs) and data traffic-shaping functions. Another benefit for our clients is that the new systems can be maintained by traditional control engineers directly, and don't require involvement by corporate IT. This lowers the barrier to design more efficient and secure network topologies."

Another useful tool, SecurePlant, has been cooperatively developed by Yokogawa, Cisco and Shell, which announced earlier this year that they're going to deploy their comprehensive security management solution at 50 Shell plants worldwide. SecurePlant consists of delivering OS patches and antivirus pattern files for control systems, and providing real-time and proactive monitoring, along with help-desk operations. Supplier-certified Windows security patches and virus signature files will be distributed from a SecureCenter to the SecureSite at each plant via Shell’s existing global network. The real-time and proactive monitoring capabilities will enable centralized management of plant security.

Training humans for a united front

While new innovations can help users stay ahead of cybersecurity threats, one of the most powerful security tools is already inside most process organizations, but remains unused by many: cooperation between plant/process and IT professionals, and training each in the needs and best security practices of the others. More recently, due to the risks posed by many outside contractors' vulnerable equipment, users are giving them same training and protections deployed internally.

"The two most potent ways to improve cybersecurity are layering network architecture defenses and training the humans," says Concept's Foster. "Phishing and spear phishing come through email, and watering hole attacks trick users into downloading malware, so it’s crucial to educate employees and third-party contractors about how to deal with them."

A&E's Tommey adds, "Last year, one of our clients got a virus on their control system, and when they checked their laptops, they found that some of the young guys in operations had changed the boot sequence on the PCs from only loading from the hard drive to also loading from a flash drive. They did it so they could load and play games, but this also introduced the virus. These abilities can be disabled, but this is also a management issue. People have to be told and trained in the rules, and then they have to be held accountable. They need to be made aware that cybersecurity threats are real and growing, avoid the normalcy bias that hackers don't usually get in and then assume they won't ever, and recognize that intrusion attempts on the IT side happen regularly.

"I'm starting to see more practicing of cybersecurity, but there's still not a big demand for it. Sadly, it will probably take another big, tragic event to get people's attention. People don't want to spend $50,000-$100,000 on cybersecurity, even though a big breach could cost 100 times as much as security system. Until the CEO, COOs and CTOs put cybersecurity in the budget, it won't happen."

Mariam Coladonato, product specialist for networking security at Phoenix Contact, adds, "This all starts with plant manager sitting down with IT, getting together on the same, and developing a cybersecurity. IT can help the plant do risk analyses and penetration tests to find, prioritize and address vulnerabilities."

Virtual, IP-aided security?

Finally, one the core principles of cybersecurity in process control is the ISA99 standard, now IEC 62443, which directs users to achieve defense-in-depth by further dividing their process control networks and sub-networks into zones with common functions, and link them with conduits guarded by managed Ethernet switches servings as firewalls (Figure 2). However, these directives can now be get an added boost from virtualized and cloud computing assisted by Internet-based networking, which is also how they've fueled the emergence of the IoT and IIoT.

Technology brief: Essentials of cybersecurity
Cybersecurity is an acknowledged and growing threat to the operational integrity of process manufacturing and other critical infrastructure sectors. This technology brief discusses and reviews the latest technology developments that are available to reduce the risks of viruses, malware and cybersecurity threats.
Finding new holes

Figure 1: One of Boliden's mining and smelting plants in Sweden uses ABB's Cyber Security Fingerprint to augment its security program by collecting data from more than 100 points in the plant's 800xA control system, interviewing personnel, and using software-based analysis to compare its performance with industry standards and best practices.
Credit: ABB

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...