System Integration & Control Systems Design


Tofino Security White Paper ISA-99

July 2012 System Integration & Control Systems Design

Anyone integrating automation technologies these days is well aware of the pressure on the operators of industrial plants to increase productivity, reduce costs and share information in real-time across multiple industrial and enterprise systems. Adding to these business pressures is the growing fear of cyber attack as the world has become aware that the Stuxnet worm was specifically designed to disrupt an industrial process. Operators and engineers are under pressure to isolate automation systems, while at the same time management is asking for greater interconnectedness.

How can you help your company or clients deal with the conflicting requirements of more integration and more isolation? This white paper explains how the ‘zone and conduit’ model included in the ANSI/ISA-99 security standards provides a framework for helping deal with network security threats that arise from both the ‘push for productivity’ and the fear of the next ‘Son-of-Stuxnet’ worm.

Why the ‘Push for Productivity’ has degraded control network security

As corporate networks have converged with industrial control system (ICS) networks, there have been many integration projects where proprietary networks were replaced with commercial-off-the-shelf equipment using Ethernet-TCP/IP technology.

This shift in technology has greatly increased the complexity and ‘interconnectedness’ of control systems. As a result, they now have many of the same vulnerabilities that have plagued enterprise networks. In addition, the controllers in these networks are now subjected to new threat sources that they were never designed to handle.

The result has been a significant increase in the number of plant disruptions and shut-downs due to cyber security issues in the control networks.

The Repository for Industrial Security Incidents (RISI) is the world’s largest database of security incidents in control and scada systems. An analysis of the data from 1982 to 2010 found that the type of incidents affecting control systems breaks down as follows:

* 50% of incidents were accidental in nature.

* 30% of incidents were due to malware.

* 11% of incidents were due to external attackers.

* 9% of incidents were due to internal attackers.

In our study of the incidents included in the RISI database, we see problems arising from three common sources:

Proliferation of ‘soft’ targets

Supervisory control and data acquisition (scada) and ICS devices such as PLCs, DCS controllers, IEDs, and RTUs were designed with a focus on reliability and real-time I/O, not robust and secure networking. Many ICS devices will crash if they receive malformed network traffic or even high loads of correctly-formed data. Also, Windows PCs in these networks that run for months at a time without security patches or antivirus updates, are ever susceptible to new, or even outdated, malware.

Multiple points of entry

Even without a direct connection to the Internet, modern control systems are accessed by numerous external sources. All of them are potential sources of infection or attack and include:

* Remote maintenance and diagnostics connections.

* Historian and manufacturing execution systems (MES) servers shared with business users.

* Remote access modems.

* Serial connections.

* Wireless systems.

* Mobile laptops.

* USB devices.

* Data files (such as PDF documents or PLC project files).

These pathways are underestimated and poorly documented by the owners and operators of industrial systems. As the Stuxnet worm showed us in 2010, these pathways can be readily exploited by malware and other disruptive elements. Stuxnet used at least eight different propagation mechanisms, including USB drives, PLC project files and print servers to work its way into the victim’s control system.

Poor internal network segmentation

Control networks are now more complex than ever before, consisting of hundreds or even thousands of individual devices. Unfortunately the design of many of these networks has remained ‘flat’ with virtually no segmentation. As a result, problems that originate in one part of the network can quickly spread to other areas.

To learn the methods of ANSI/ISA-99 Zone and Conduit Security Model framework for network security improvements through integrated design, implementation, monitoring and continuous improvement, visit http://instrumentation.co.za/+C16783



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Powering southern Africa’s industrial evolution for over five decades
Oilpower System Integration & Control Systems Design
Established in 1974, Oilpower is a recognised name in South Africa’s hydraulic and pneumatic sector. What started as a small, family-run business has matured into a highly structured operation with specialised teams, experienced engineers and a reputation for technical excellence and reliability. Oilpower is celebrating its 50th anniversary this year

Read more...
Metal plant automation upgrade
ABB South Africa System Integration & Control Systems Design
A combined compressor house (CCH) control system replacement project, undertaken by NJC, an ABB Authorised Value Provider (AVP), has won high praise from client ArcelorMittal.

Read more...
SIs - the channel’s conductors of light
Schneider Electric South Africa System Integration & Control Systems Design
Today’s original equipment manufacturers are innovators in the truest sense, driving the absolute newest in technological advancement. While they develop advanced and often groundbreaking solutions, it is the system integrators who bring these innovations to life.

Read more...
Hazardous area solutions
Extech Safety Systems IS & Ex
SEW-EURODRIVE is revolutionising industrial automation with advanced gear units, decentralised drives and the energy-efficient MOVIGEAR system.

Read more...
The state of the SI industry remains strong and is expanding
System Integration & Control Systems Design
The system integration (SI) industry is expanding with the adoption of AI, automation and data sharing, allowing companies to improve operational efficiency and competitiveness across diverse sectors.

Read more...
Inspection system for leak detection in valves in hazardous areas
Extech Safety Systems Valves, Actuators & Pump Control
Leaking valves in industrial plants not only lead to loss, safety risks and possible contamination and pollution, but also result in high economic costs. Therefore, valves in hazardous areas require regular proper inspection and preventive maintenance to ensure their functionality.

Read more...
The symbiotic relationship between OEMs and SIs
Schneider Electric South Africa Editor's Choice System Integration & Control Systems Design
While businesses tend to turn directly to original equipment manufacturers OEMs or vendors when embarking on IT projects, the role of the SI as a key facilitator and partner cannot be overstated.

Read more...
Flexible and precise dispensing technology
Beckhoff Automation System Integration & Control Systems Design
The Scheugenpflug ProcessModule axis system forms the basis of Atlas Copco’s dispensing and screwing cells and a flexible integration platform for general contractors and machine builders. Precise process sequences are ensured by TwinCAT CNC and servo drive technology from Beckhoff.

Read more...
World’s first 5G smartphone for ATEX and IECEx zone 1/21
Extech Safety Systems IS & Ex
i.safe MOBILE has launched the world’s first 5G smartphone for ATEX and IECEx zone 1/21. The intrinsically safe mobile device, which was also developed for use in 5G campus networks, offers companies great flexibility thanks to its wide range of possible applications, especially in the automation sector.

Read more...
The time is now for systems integrators
Editor's Choice System Integration & Control Systems Design
Integrators combine sophistication regarding technology innovation with practical, hands-on experience. Collaborating with systems integrators is the means to significant productivity improvement, powered by the convergence of automation and information and operations technology.

Read more...