Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Planned Plant Shutdowns: Cybersecurity Opportunities and Risks

During planned plant shutdowns, cybersecurity is often overlooked. In today’s threat landscape, however, it is essential to incorporate cybersecurity into the shutdown process. Plant shutdown activities are hectic and require engagement from all stakeholders to make sure all objectives are met and the plant is reactivated safely. But here is the take — the ultimate objective, besides safety, shall also include security.

Use Plant Shutdown Periods to Strengthen Cybersecurity Posture

Planned plant shutdowns offer a great opportunity to incorporate critical cybersecurity measures that cannot be acted upon during typical plant operations. Some key elements that can be addressed during shutdown include:

Installation of Critical Security Patches to OT Systems

During planned shutdowns, critical security patches can be installed that cannot be done during normal plant operations due to the risk of operational disruptions.

Upgrading Legacy or Outdated Systems and OS

It is not advisable to upgrade legacy systems or outdated OS machines during normal plant operations. During a plant shutdown, such activities can be planned without the fear of interrupting plant operations.

Upgrading Plant Network Design and Network Device Rules

When networks are down during planned shutdowns, activities can be planned where critical design or network device rules can be changed without impacting plant operations.

Key Cybersecurity Concerns During Plant Shutdowns

During plant shutdowns, several key cybersecurity concerns must be monitored:

Increase in Phishing Attacks

Due to increased involvement of external contractors and third parties, the organization is exposed to targeted phishing attacks. The attackers manipulate using a false sense of urgency to take action on supply chain and procurement requests, enticing legitimate users to download malicious files or click on phishing links to harvest the credentials and ultimately infect systems with malware.

The organization shall carefully design cybersecurity awareness and training before and during shutdown for company personnel, contractors and third parties during their onboarding.

Delay Response to Cybersecurity Incidents

Plant shutdown activities can delay or hinder the ability to respond to cybersecurity incidents in a timely manner. This is due to the complexity of shutdown activities and the engagement of key incident response team stakeholders in these activities that will be busy in achieving goals and objectives in very tight timelines.

Data Loss

Plant shutdown activities involve system modifications — the improper handling of which can result in data loss, corruption or even data theft due to increased involvement of new contractors and third parties that will have system and data access.

The shutdown activities involving system modifications and updating configuration, e.g., PLCs, shall be designed carefully to mitigate the risk of data loss or corruption. Non-disclosure agreements (NDAs) shall be signed with contractors and third parties, and monitoring shall be done for activities performed by them involving the handling of data to avoid unauthorized access or even theft.


Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive regular emails with links to thought leadership, research and other insights from the OT cybersecurity community.

Muhammad Shoaib
Muhammad Shoaib
Muhammad Shoaib is an IT/OT cybersecurity GRC specialist with over 12 years of experience, currently serving the world’s largest IGCC plant.

Related Posts

Planned Plant Shutdowns: Cybersecurity Opportunities and Risks

During planned plant shutdowns, cybersecurity is often overlooked. In today’s threat landscape, however, ...
Muhammad Shoaib Feb 14, 2025 7:00:00 AM

Confronting the OWASP Top 10 OSS Risks for Industrial Automation Control Systems

Industrial automation and control systems (IACS) and critical infrastructure are increasingly reliant on ...
SZ Lin Feb 7, 2025 7:00:00 AM

The Role of Data Destruction in Industrial Security

As you review cybersecurity practices this year, ensuring your industrial organization has appropriate da...
Zac Amos Jan 31, 2025 7:00:00 AM