IT in Manufacturing


Industrial control system cybersecurity

March 2018 IT in Manufacturing

In Part 1 in the series of cybersecurity articles for 2018 (http://www.instrumentation.co.za/58931n), we looked at risk assessments within industrial control systems (ICS), including creating an ICS cybersecurity policy. In Part 2, we look at asset discovery (and continuing to do so), and vulnerability management on an ICS.

Vulnerabilities in the ICS environment represent a significant risk to organisations that run control systems, be that a manufacturing, mining or critical infrastructure organisation. These vulnerabilities are becoming more widely exploited by cyber criminals as was evident with the recent Triton and Crashoverride malware variants.

Asset discovery

The best way of understanding your assets is by keeping a comprehensive asset (PLC, HMI, engineering workstations, etc.) register. Without a comprehensive asset register, it will be difficult to protect your systems effectively, as the asset register will assist you in understanding your network by defining the assets (i.e. vendor, model number) and defining how the assets communicate.

In Part 1, we discussed conducting a risk assessment (RA) and if the RA is conducted correctly, you should have a great base to work from. There are various tools that can assist you with identifying assets, such as Grass Marlin (discussed in Part 1), Wireshark and if you are really brave, there is arp-scan that will allow you to identify live hosts. As a cautionary note, please make sure that you are familiar with the tools mentioned above, or that you have tested the tools in an offline environment, as incorrect use could result in unwanted results and failures on the ICS systems. ICS asset scanning can fill a whole book on its own, but the use of these aforementioned tools is well documented and there are plenty of in-depth articles available to assist. There are also some great commercial-off-the-shelf (COTS) solutions available, and most of these solutions tend to offer more than just asset identification and tagging, some going so far as to map out the entire ICS network. The asset register will also help with effective network segmentation (which we will cover in Part 6), network security monitoring (which we will discuss in Part 4), and vulnerability management, which we will discuss next.

Vulnerability management

Vulnerability management, or should I say effective vulnerability management, which includes scanning for vulnerabilities and patching them, is a critical component in protecting both hardware and software systems. In OT/ICS systems however, this gets a little trickier, which I will elaborate on now. The first problem is that of finding the vulnerabilities, as most control assets are not designed to be ‘interrogated’, as is the case for IT assets. The second problem is that if you have managed to identify vulnerability, you are not able to patch it as most control networks operate 24/7/365.

So, if we are unable to scan our assets and cannot patch the vulnerabilities, what do we do? An effective cybersecurity strategy for applying patches combined with specifically developed ICS vulnerability scanning solutions can help. First, one needs to identify the different components of the ICS network(s), and as discussed above, an in-depth asset register will help in this regard. Each set of components will require a different strategy, and then these need to be documented and implemented in the overall cybersecurity program.

Putting things into perspective

Scenario 1

The engineering workstations are only utilised daily between the working hours from 07h00 to 17h00. This would potentially allow us to scan for vulnerabilities, identify which patches need to be applied and then patch the engineering workstations during off peak hours. (As a cautionary note, and in line with industry best practice, it is strongly recommended that patches are tested before applying them.)

Scenario 2

The control room workstations and the PLCs are used 24/7. We are therefore unable to scan these machines for vulnerabilities, and also unable to patch them. For this, we need to look towards non-intrusive passive scanners such as OpenVAS, or my personal recommendation of the Bandolier Project, which is a joint initiative between Digital Bond and Nessus from Tenable. In a nutshell, a passive scanner monitors network traffic at the packet layer to determine services and to identify and assess vulnerabilities, without affecting asset or network performance.

Patching is bit more difficult as the only real time slots we would have to apply these is during a shutdown. Generally, these occur between 1 and 5 times per year, and this period provides an ideal opportunity to patch the effected systems. The problem is that these times are normally reserved for engineers and vendors to make their changes, and to slot in new assets. This is where you need to fight for your piece of the pie and get board-level management buy in, so that you are allocated a time frame to apply your fixes.

Conclusion

To effectively manage vulnerabilities, you need to understand your assets and continuously monitor them for any changes, along with understanding your network(s). Vulnerabilities are not just classified as hardware or software flaws, they could also arise through incorrectly configured devices such as PLCs, industrial switches or control systems and other engineering workstations. This means that it is no longer just the ICS networks that are at risk, safety systems just became vulnerable as well.

Tommy Thompson is a passionate cybersecurity professional with some 15 years’ experience. Starting as a firewall engineer in 2001, Thompson has assisted a variety of companies in numerous roles with their cybersecurity problems. He holds a BComm degree in Information Management from Oxford Brookes University (UK) and he is certified by PECB (Canada), as a Scada Security Professional (CSSP).

For further information contact Tommy Thompson, +27 (0)11 463 0096, tommy@nclose.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Green IT practices: cutting costs while saving the planet
IT in Manufacturing
Sustainable IT practices are proving that companies can reduce their carbon footprint and operating costs simultaneously. The financial benefits are significant, offering a promising outlook for businesses.

Read more...
Coolant distribution unit for high-density data centres
Schneider Electric South Africa IT in Manufacturing
Motivair by Schneider Electric has introduced a new, industry-leading 2,5 MW coolant distribution unit designed to cool high-density data centres reliably and at scale.

Read more...
Data protection is the first line, recovery is the lifeline
IT in Manufacturing
Many businesses only realise the importance of data protection after experiencing system failures or data loss. The 3-2-1-1 backup model is a proven approach for safeguarding data.

Read more...
Cyber resilience moves from IT issue to board risk
IT in Manufacturing
Cybersecurity has shifted decisively from an IT concern to a core business risk, and South African organisations are feeling this change acutely.

Read more...
Cybersecurity in South Africa
IT in Manufacturing
For cyber risk in South Africa the question is not ‘if’ but ‘when’.

Read more...
Sustainable aviation fuel
Siemens South Africa IT in Manufacturing
Siemens and the cleantech company CAPHENIA have entered a partnership to scale the production of sustainable aviation fuel.

Read more...
Using AI to solve South Africa’s biggest challenges
IT in Manufacturing
Unlike global superpowers that invest heavily in sheer compute capacity, South Africa doesn’t need to be the largest computing market to lead in innovation. What matters today is how we apply computing to accelerate insight, discovery and socio-economic progress.

Read more...
Unearthing AI’s real value in African mining
IT in Manufacturing
At Mining Indaba 2026, where miners and technology innovators explored how partnerships are turning AI’s potential into meaningful operational impact. For Siemens, the answer begins with a clear-eyed view of what AI can and cannot do, and a commitment to deploying it where it matters most - keeping people safe.

Read more...
Digital innovations reshaping the future of mining in Africa
IT in Manufacturing
Africa’s mining sector is stepping into a new era, driven by the accelerating pace of digital transformation. Digital tools are making operations smarter, safer and more efficient, laying the groundwork for a more competitive and sustainable industry.

Read more...
Siemens drives next-generation vehicle development
Siemens South Africa IT in Manufacturing
The Siemens PAVE360 Automotive technology is a new category of digital twin software that is pre-integrated and designed as an off-the-shelf offering to address the escalating complexity of automotive hardware and software integration.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved