System Integration & Control Systems Design


Tofino Security White Paper ISA-99

July 2012 System Integration & Control Systems Design

Anyone integrating automation technologies these days is well aware of the pressure on the operators of industrial plants to increase productivity, reduce costs and share information in real-time across multiple industrial and enterprise systems. Adding to these business pressures is the growing fear of cyber attack as the world has become aware that the Stuxnet worm was specifically designed to disrupt an industrial process. Operators and engineers are under pressure to isolate automation systems, while at the same time management is asking for greater interconnectedness.

How can you help your company or clients deal with the conflicting requirements of more integration and more isolation? This white paper explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for helping deal with network security threats that arise from both the ‘push for productivity’ and the fear of the next ‘Son-of-Stuxnet’ worm.

Why the ‘Push for Productivity’ has degraded control network security

As corporate networks have converged with industrial control system (ICS) networks, there have been many integration projects where proprietary networks were replaced with commercial-off-the-shelf equipment using Ethernet-TCP/IP technology.

This shift in technology has greatly increased the complexity and ‘interconnectedness’ of control systems. As a result, they now have many of the same vulnerabilities that have plagued enterprise networks. In addition, the controllers in these networks are now subjected to new threat sources that they were never designed to handle.

The result has been a significant increase in the number of plant disruptions and shut-downs due to cyber security issues in the control networks.

The Repository for Industrial Security Incidents (RISI) is the world’s largest database of security incidents in control and scada systems. An analysis of the data from 1982 to 2010 found that the type of incidents affecting control systems breaks down as follows:

* 50% of incidents were accidental in nature.

* 30% of incidents were due to malware.

* 11% of incidents were due to external attackers.

* 9% of incidents were due to internal attackers.

In our study of the incidents included in the RISI database, we see problems arising from three common sources:

Proliferation of ‘soft’ targets

Supervisory control and data acquisition (scada) and ICS devices such as PLCs, DCS controllers, IEDs, and RTUs were designed with a focus on reliability and real-time I/O, not robust and secure networking. Many ICS devices will crash if they receive malformed network traffic or even high loads of correctly-formed data. Also, Windows PCs in these networks that run for months at a time without security patches or antivirus updates, are ever susceptible to new, or even outdated, malware.

Multiple points of entry

Even without a direct connection to the Internet, modern control systems are accessed by numerous external sources. All of them are potential sources of infection or attack and include:

* Remote maintenance and diagnostics connections.

* Historian and manufacturing execution systems (MES) servers shared with business users.

* Remote access modems.

* Serial connections.

* Wireless systems.

* Mobile laptops.

* USB devices.

* Data files (such as PDF documents or PLC project files).

These pathways are underestimated and poorly documented by the owners and operators of industrial systems. As the Stuxnet worm showed us in 2010, these pathways can be readily exploited by malware and other disruptive elements. Stuxnet used at least eight different propagation mechanisms, including USB drives, PLC project files and print servers to work its way into the victim’s control system.

Poor internal network segmentation

Control networks are now more complex than ever before, consisting of hundreds or even thousands of individual devices. Unfortunately the design of many of these networks has remained ‘flat’ with virtually no segmentation. As a result, problems that originate in one part of the network can quickly spread to other areas.

To learn the methods of ANSI/ISA-99 Zone and Conduit Security Model framework for network security improvements through integrated design, implementation, monitoring and continuous improvement, visit http://instrumentation.co.za/+C16783



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Understanding the role of AI in generative engineering design
System Integration & Control Systems Design
When a design engineer sets out to design a new part, component, or assembly, the intent is to meet the design requirements for fit, form and function, and also incorporate a certain degree of innovation and elegance to the overall design. There is no reason to re-invent the wheel by introducing a new design.

Read more...
PCS stays up so you don’t have to
PCS Global System Integration & Control Systems Design
Maybe it’s time to look at a solution that stays online 99,99999% of the time so you don’t have to. This the world of Stratus computer platforms, tailor-made for your critical applications.

Read more...
Four ways the global parts shortage has led to innovation and openness
System Integration & Control Systems Design
For those who use automation parts, the unpredictable nature of the supply chain is one of the biggest problems faced today. The shortfall has impacted every industry, but automation components have been especially affected.

Read more...
Iritron’s year of consolidation
Iritron Editor's Choice System Integration & Control Systems Design
Despite the multiple challenges faced by businesses in South Africa, the buoyancy of the technology sector worldwide has produced some green shoots for automation specialist, Iritron.

Read more...
Five edge opportunities for SIs to maximise revenue in 2024
Editor's Choice System Integration & Control Systems Design
System integrators continue to face the challenge of doing more with less – supporting complex operations, while meeting production schedules with limited resources, and innovating to increase efficiency, maximise safety and reduce risk.

Read more...
Condition monitoring in a forging press retrofit
Beckhoff Automation System Integration & Control Systems Design
Significantly increased vibration on machines can result in many forms of negative impacts such as reduced system performance or damage to the machine and foundation. Using the example of retrofitting a forging press with a maximum press force of 2000 tons, Wölfel Engineering explains how efficiently the process was tailored and implemented with PC-based control and measurement technology from Beckhoff.

Read more...
System integration in the digital age
System Integration & Control Systems Design
To meet the challenges of an increasingly competitive marketplace, many manufacturers (end users) must focus on their core competencies and outsource the rest to experts.

Read more...
Choosing a system integrator
Editor's Choice System Integration & Control Systems Design
Automation is an essential part of manufacturing today. Whatever the size, an upgrade or migration project can be complex, and the risks can be high. This is where system integrators (SIs) can help. They can bring together complex subsystems or components of a larger system and make them operate as a whole.

Read more...
Iritron awarded international contract for furnace control
Iritron System Integration & Control Systems Design
Iritron has been awarded two international, multimillion-Rand furnace drying projects. The company has extensive expertise in furnace drying control systems, and provides solutions in the fields of electrical, instrumentation, control systems, and decision support systems.

Read more...
Mobile devices in hazardous areas
Extech Safety Systems IS & Ex
The intention of this paper is to outline the basic requirements for designing and manufacturing an IS mobile device. What are the risks and what do the standards say? This will explain why IS mobile devices are more expensive than standard rugged devices.

Read more...