Introduction
In this blog post, we’ll share practical insights from operational experience in managing cybersecurity for industrial control systems (ICS) in process plants. The goal is to help asset owners embark on their journey toward securing plant operations, especially as cyber incidents continue to rise, potentially impacting safety, reliability and financial performance.
Take 1 – Cybersecurity is Not a “Project;” It’s a Continuous Process
- Treat ICS cybersecurity like safety. Ensure senior management is actively engaged, as safety and security both impact process safety and reliability.
- Recognize ICS users as a first line of defense. Invest in user awareness training to promote a cultural shift. Engage users through regular training sessions, quizzes and cybersecurity bulletins.
- Stay informed. Establish processes for regularly reviewing and acting on ICS security advisories from OEMs, CERTs and other trusted sources.
- Implement incident handling processes. Enable ICS users to efficiently report and manage cybersecurity incidents or near-misses to minimize downtime and foster a culture of continuous learning.
- Adopt industry standards. Implement the ISA/IEC 62443 series of standards as a framework for managing ICS security. These provide a comprehensive approach to securing industrial systems.
Take 2 – Do the Basics First, and Do It Right
- Physical security matters. Ensure that all ICS components — including HMIs, servers, engineering stations, control devices, switches and firewalls — are physically secured. Remember: If you can touch it, you can break it.
- Implement basic cybersecurity controls. Focus on system hardening, individual accountability, role-based least-privilege access and control over removable media and remote desktop access.
- Advanced tools are only effective if the basics are in place. Security surveillance and monitoring tools are ineffective if foundational controls like access restrictions and system hardening are not properly implemented.
- Restrict remote and external connections. By default, limit these connections and allow exceptions only when the associated risks have been adequately mitigated.
- Audit and log what matters. Configure audit policies and security logs on all ICS systems locally. Detective controls are essential to track potential incidents and take corrective actions.
- Air-gap safety systems. Isolate safety systems to secure them inherently. Remember safety systems are our last line of defense.
Take 3 – Avoid Generalizing Risk
- Identify your assets. Develop realistic risk scenarios based on credible threats specific to your assets and systems.
- Avoid emotional engineering — oversimplified, fear-driven projections of cybersecurity risks. Generic risks may not be applicable to your specific assets or systems.
- Consider asset location. Physical location can “mitigate or avoid” certain threats, so assess your asset risk based on geography.
- Perform detailed risk assessments. Maintain an updated asset inventory and assess specific risks to each asset. Communicate these risks clearly to asset owners and stakeholders.
Take 4 – Apply Fit-for-Purpose Controls
- Tailor controls to the risk. Not all assets need the same level of security. For example, an intrusion detection system (IDS) might not be appropriate for stand-alone or physically isolated systems.
- Adopt a “defense in depth” approach to improve the resilience of your control systems. Adding more unrelated controls doesn’t guarantee stronger security. Ensure each layer contributes meaningfully to your risk treatment strategy.
- Identify common cause failures that could compromise all controls simultaneously. Apply truly independent controls to minimize single points of failure.
- Remember, one size doesn’t fit all!
Take 5 – Implement a Cybersecurity Sustainment Program
- Include cybersecurity sustainment tasks within the plant preventive maintenance (PPM) program. Sustainment of cybersecurity controls is essential for continued safety and reliability.
- Implement basic sustainment controls, including but not limited to periodic operating system patching, antivirus updates, system backups and user access reviews.
- Ensure a robust training and competency management system is in place to keep ICS security personnel’s skills up-to-date with the evolving threat landscape and emerging technologies.
- Apply change management consistently, especially for ICS security configuration changes, and include these in the management of change (MOC) process. Failing to capture even seemingly simple software changes could have a major impact on safety and availability of plant operations.
Closing Remarks
Effective control system security is a continuous, evolving process that requires a combination of technical measures, user awareness and a structured approach to improvement. By focusing on these practical steps, organizations can reduce risk, strengthen resilience and ensure operational integrity in the face of increasingly complex cybersecurity challenges.