Building a Resilient World: Practical Automation Cybersecurity

Planned Plant Shutdowns: Cybersecurity Opportunities and Risks

Written by Muhammad Shoaib | Feb 14, 2025 12:00:00 PM

During planned plant shutdowns, cybersecurity is often overlooked. In today’s threat landscape, however, it is essential to incorporate cybersecurity into the shutdown process. Plant shutdown activities are hectic and require engagement from all stakeholders to make sure all objectives are met and the plant is reactivated safely. But here is the take — the ultimate objective, besides safety, shall also include security.

Use Plant Shutdown Periods to Strengthen Cybersecurity Posture

Planned plant shutdowns offer a great opportunity to incorporate critical cybersecurity measures that cannot be acted upon during typical plant operations. Some key elements that can be addressed during shutdown include:

Installation of Critical Security Patches to OT Systems

During planned shutdowns, critical security patches can be installed that cannot be done during normal plant operations due to the risk of operational disruptions.

Upgrading Legacy or Outdated Systems and OS

It is not advisable to upgrade legacy systems or outdated OS machines during normal plant operations. During a plant shutdown, such activities can be planned without the fear of interrupting plant operations.

Upgrading Plant Network Design and Network Device Rules

When networks are down during planned shutdowns, activities can be planned where critical design or network device rules can be changed without impacting plant operations.

Key Cybersecurity Concerns During Plant Shutdowns

During plant shutdowns, several key cybersecurity concerns must be monitored:

Increase in Phishing Attacks

Due to increased involvement of external contractors and third parties, the organization is exposed to targeted phishing attacks. The attackers manipulate using a false sense of urgency to take action on supply chain and procurement requests, enticing legitimate users to download malicious files or click on phishing links to harvest the credentials and ultimately infect systems with malware.

The organization shall carefully design cybersecurity awareness and training before and during shutdown for company personnel, contractors and third parties during their onboarding.

Delay Response to Cybersecurity Incidents

Plant shutdown activities can delay or hinder the ability to respond to cybersecurity incidents in a timely manner. This is due to the complexity of shutdown activities and the engagement of key incident response team stakeholders in these activities that will be busy in achieving goals and objectives in very tight timelines.

Data Loss

Plant shutdown activities involve system modifications — the improper handling of which can result in data loss, corruption or even data theft due to increased involvement of new contractors and third parties that will have system and data access.

The shutdown activities involving system modifications and updating configuration, e.g., PLCs, shall be designed carefully to mitigate the risk of data loss or corruption. Non-disclosure agreements (NDAs) shall be signed with contractors and third parties, and monitoring shall be done for activities performed by them involving the handling of data to avoid unauthorized access or even theft.

Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive regular emails with links to thought leadership, research and other insights from the OT cybersecurity community.