22.05.2017 Views

Maintworld 2/2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CYBERSECURITY<br />

WHEN IT COMES TO AUTOMATION SYSTEMS, THE<br />

GOALS OF CYBERSECURITY AND MAINTENANCE<br />

ARE PRACTICALLY THE SAME: ENSURING ERROR-FREE<br />

PRODUCTION AND SAFETY.<br />

How to Improve Cybersecurity<br />

When considering automation systems<br />

from a cybersecurity standpoint, one<br />

challenge stands out above all: their long<br />

lifecycle. IT systems have a lifecycle<br />

of around five years, whereas automation<br />

systems have an average lifecycle<br />

of around 25 years. What this means in<br />

practice is that even though today’s automation<br />

systems suppliers work on improving<br />

the cybersecurity of their own<br />

systems, it will take up to 25 years for<br />

these built-in security features to permeate<br />

the entire manufacturing industry,<br />

and at that time, some of the security<br />

controls may already be obsolete.<br />

However, it is possible to substantially<br />

improve the cybersecurity of<br />

automation systems, even though some<br />

vulnerabilities might still remain. It is<br />

also important to acknowledge that all<br />

assets are not equally important, and<br />

that the security posture of a system can<br />

be substantially improved by making<br />

good engineering decisions for example<br />

on the architecture and functionality allocation.<br />

It is also recommended to perform a<br />

risk assessment. The purpose of the risk<br />

assessment is to identify the potential<br />

plant vulnerabilities and critical systems<br />

related to the operation. I would not<br />

recommend putting too much effort into<br />

assessing the probability of different<br />

events, but concentrating on the potential<br />

consequences and their acceptance.<br />

I.e. if a potential cause of a cybersecurity<br />

attack utilizing a remote connection<br />

could lead to an extensive equipment<br />

failure or jeopardize employee’s health<br />

or life, a strong argument can be made to<br />

make some changes to remove or minimize<br />

the risk. The risk assessment needs<br />

to be a multi domain task, performed in<br />

co-operation by cybersecurity experts,<br />

process engineers, safety engineers and<br />

maintenance engineers.<br />

Regardless of the outcome of the risk<br />

assessment, here are some recommendations<br />

what should be done.<br />

Consider securing your plant’s safety<br />

automation solutions or safeguards, of<br />

course provided that they are digital.<br />

With these I mean functions intended<br />

for protecting employees, production<br />

equipment and the environment against<br />

accidents or hazards. Where possible,<br />

you should isolate protective automatic<br />

systems or functions from the operative<br />

automation systems. This should also be<br />

a basic rule when designing new control<br />

systems.<br />

The operative automation system<br />

should also be segregated from other<br />

company networks. Isolating your production<br />

environment from the company<br />

network has been considered to be the<br />

best control against cybersecurity attacks.<br />

It is a solid protective measure for<br />

network-based attacks, provided you<br />

know what you are doing and procedures<br />

are in place to systematically support<br />

the isolation. In many cases however,<br />

this kind of isolation only serves to give<br />

a false sense of security as, for example,<br />

production planning and management<br />

often requires real time information<br />

from the production systems for various<br />

business needs. This information<br />

is then transferred using USB memory<br />

sticks or similar media, which in turn are<br />

common vectors for malware infections.<br />

Also, automation suppliers often maintain<br />

remote maintenance connections<br />

to the systems they have supplied, which<br />

means that the system is not actually<br />

isolated.<br />

A better way to protect your system<br />

against cybersecurity attacks is<br />

to connect it to the company network,<br />

and route all the needed connections<br />

through a dedicated access point, allowing<br />

the management and monitoring of<br />

remote connections and ensuring that<br />

existing cybersecurity controls are not<br />

bypassed. Continuous monitoring will<br />

also help you identify remote sessions<br />

from your automation systems vendor<br />

and changes made through these connections<br />

to the system’s configuration.<br />

In other words, monitoring tools can also<br />

be utilized for contract management,<br />

allowing you to monitor the supplier’s<br />

actions, and for configuration management,<br />

allowing you to verify whether<br />

planned changes have actually been implemented.<br />

All in all, those working with automation<br />

systems should deepen their mutual<br />

collaboration. This is especially true for<br />

maintenance and cybersecurity professionals.<br />

Solid cooperation ensures that<br />

all aspects required for safe and stable<br />

production are taken into account. From<br />

early planning stages to decommissioning<br />

and dismantling, modern cybersecurity<br />

must be considered throughout<br />

an automation system’s lifecycle. When<br />

considering digital cybersecurity solutions,<br />

I would recommend checking that<br />

your organization has access to the latest<br />

and most comprehensive know-how in<br />

the cybersecurity industry.<br />

42 maintworld 2/<strong>2017</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!