Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Cybersecurity—Why It’s Part of Your Safety Plan

In modern industrial environments, safety is an expectation. In most places, the safety of workers and the environment is expected by law, by contract, and by culture; the care and safety of physical production assets is critical to profitability.

Today, failure to manage cybersecurity risks puts more than your customer records at riskit places your physical assets and intellectual property at risk, along with the safety of workers, the environment, and the surrounding community.

Best-in-class companies are already proving the tremendous value of digital transformation. Using greater connectivity, smart devices, systems, and software, they’re gaining contextualized information and insights into their operations. These insights are helping increase throughput and efficiency, decrease costs, make smart and timely decisions, improve safety and meet customer expectations.

The necessity of these insights is driving investments in smarter devices that detect when they need maintenance before they fail, integrated control systems that analyze the current state of operation and optimize productivity and safety, and connectivity throughout the supply chain to coordinate activities.

But with smarter technologies and greater connectivity come new risks.

Historically, industrial control systems (ICS) were disconnected from information technology (IT) used in front offices. ICS ran on proprietary hardware and were even programmed using proprietary systems. Demands for less expensive and easier to use ICS products brought the use of open technologies to ICS, and digital transformation brought connectivity of ISC to IT, providing pathways between the Internet and plant floor devices.  

Some have used this as an argument against modernization. But it’s important to recognize that maintaining legacy systems too long not only deprives you of the valuable insights IIoT bringslegacy systems most often lack the security measures of contemporary systems.

Which brings us back to the point. A cyberattack on your ICS can disrupt or damage physical assets, steal intellectual property, alter recipes, injure workers, or cause severe environmental damage to the surrounding area.

Previously, criminals launched cyber-attacks primarily for financial gain; now nation states and organized criminal groups are attempting to damage, disrupt, or modify infected industrial control systems (ICS) and networks.

Cyber-attacks can have catastrophic effects on safety and public health.

               - American Bar Association, Insurance Coverage Litigation Committee, 2016

If you’re on a digital transformation journeyand most are, whether it’s a managed process or slow evolutionmanaging the inherent safety and security risks should be an integral part of the process. A properly designed security approach will improve information collection, analysis, and delivery. It will minimize security-related interruptions and frustrations. And it will help protect your enterprise.

Security, like safety, approaches issues based on managing risk, leveraging continuous assessment, and baselining to ensure you are managing to a risk threshold. Your level of acceptable risk will vary by industry and potential outcomes.

Today, both security and safety standards are recognizing these risks:

Cybersecurity standard ISA/IEC 62443-1-1, Section 4.1:

… However, because industrial automation and control systems equipment connect directly to a process, loss of trade secrets and interruption in the flow of information are not the only direct consequences of a security breach. The potential loss of life or production, environmental damage, regulatory violation, and compromise to operational safety are far more serious consequences. These may have ramifications beyond the targeted organization; they may grievously damage the infrastructure of the host region or nation.

Functional safety standard IEC 61508-1 7.4.2.3:

The hazards, hazardous events and hazardous situations of the EUC and the EUC control system shall be determined under all reasonably foreseeable circumstances (including fault conditions, reasonably foreseeable misuse and malevolent or unauthorized action). This shall include all relevant human factor issues, and shall give particular attention to abnormal or infrequent modes of operation of the EUC. If the hazard analysis identifies that malevolent or unauthorized action, constituting a security threat, as being reasonably foreseeable, then a security threats analysis should be carried out.

Considering that most cybersecurity attacks are based on the attacker simply finding a vulnerable target rather than being specifically targeted due to industry or prominence, a cybersecurity attack is a foreseeable circumstance in virtually every industry. Assessing your cybersecurity risks, determining your level of acceptable risk, and mitigating identified risks to an acceptable level are now the basic “reasonable” steps to protect people from foreseeable misuse and malevolent or unauthorized actions.

As with safety, ignoring cybersecurity and associated risksin the mistaken belief that “if I don’t know about the risk, I can’t be held accountable”is not an acceptable posture.

While many security practices have long been used in the IT world, they are new to the OT world. And, while many of the mitigation steps are similar in comparison, they are applied very differently in the front office than on the plant floor.

Cybersecurity risks are safety risks. In the modern manufacturing environment, both should be part of risk management and part of the management of change (MOC) process. Environmental Health and Safety professionals should be involved in managing processes and compliance with standards and the law.

It’s a new age in industry. The advantages of Industry 4.0 certainly outweigh the increased risks. Understanding the risks and mitigating them is part of the plan.

 

A version of this post can also be found on the Rockwell Automation blog. It appears on the ISAGCA blog with adjustments made by the author.

Steve Ludwig, Rockwell Automation
Steve Ludwig, Rockwell Automation
Steve Ludwig is the commercial programs manager of safety at Rockwell Automation.

Related Posts

Should ISA/IEC 62443 Security Level 2 Be the Minimum for COTS Components?

A recent white paper published by the ISA Security Compliance Institute (ISCI) and its ISASecure certific...
Liz Neiman Apr 23, 2024 5:18:27 PM

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM