ISA Interchange

Welcome to the official blog of the International Society of Automation (ISA).

This blog covers numerous topics on industrial automation such as operations & management, continuous & batch processing, connectivity, manufacturing & machine control, and Industry 4.0.

The material and information contained on this website is for general information purposes only. ISA blog posts may be authored by ISA staff and guest authors from the automation community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Webinar Recording: How to Build and Secure Reliable Industrial Control Systems

 

This guest blog post was written by Alex Tarter, Ph.D., technical director of cybersecurity at Ultra Electronics, 3eTI. This post was written in conjunction with an ISA co-hosted webinar on advances in industrial control system design against malicious attacks and unintentional cyber incidents.

 

I am always pleased to share operationally sound methods for deeply layering security, and I frequently demonstrate live hacks that illustrate how exploits can be countered undetectably to hackers once they've breached the firewall — as they inevitably will.

Recently I had the opportunity to team with an expert security researcher to investigate new capabilities that add security to widely used, and inherently vulnerable, protocols such as DNP3 in industrial control systems. Investigators have discovered numerous weaknesses associated with the protocol that is in wide use in the SCADA systems driving most industrial control system (ICS) networks. Some of these flaws can severely compromise equipment, and even halt operations. Organizations like the DNP User’s Group and ICS-CERT have been sounding the alarm about the protocol's security problems, and how tricky they can be when implementing a DNP3 solution that is both secure and robust.

Industrial networks promote the free flow of messages that may also carry malware directly to a particular sensor. Knowing this, we developed a new method for picking up where DNP3 Secure Authentication ends in order to protect all payloads, as well as those from a compromised device. While most security systems do little more than signature-based matching, a validated, protocol-aware, packet inspection solution will parse the DNP3 protocol, including DNP3 Secure Authentication messages, to detect any malformed, unauthorized, or malicious messages.

In this way, you can up the ante on your proactive initiatives to mitigate the ICS's most deeply embedded vulnerabilities — and do so without decreasing network productivity. The applications for DNP3 solutions stretch far and wide throughout the industrial control world. I am confident that this method will prevent many serious ICS issues. It also helps build stronger infrastructures that model the security standards that are effectively used by the U.S. Department of Defense.

Design a system that leaves no security stone unturned

When considering a security design for your plant or facility operations, make sure to factor in these aspects of the cybersecurity landscape:

  • Traditional information assurance (IA) practices are left over from World War II days when the biggest threat was the enemy breaking encryption (the Enigma machine, for example). IA practice was all about secure implementations of encryption and key management – protecting your information from an external attacker.
  • Cyber attacks are a fundamentally different problem because they occur from within a system. An attacker gets into your system and then looks to pillage as many other areas and devices as possible.
  • Today, the danger lies with the interconnected devices inside the system that individually manage essential, discrete operations. These devices must be protected against both external AND internal attackers.

However, not everyone agrees on how to fix these problems. Enterprise ICS operators understand network vulnerabilities, but often balk at the perceived costs of the solutions. The COOs often focus on the potential for operational interruptions with more deeply embedded security, and the CSOs may question the risk-effectiveness of one approach over another, and may not agree with C-suite colleagues on optimal solutions.

Industry needs to continue to demonstrate how optimal and government-grade cybersecurity can be achieved to the satisfaction of control industry CSOs and COOs. Layering in security can mitigate protocol weaknesses affordably without impacting operational performance. I see exciting advancements ahead for stronger and safer critical systems, and look forward to sharing new strategies widely.

 

ISA offers standards-based industrial cybersecurity training, certificate programs, conformity assessment programs, and technical resources. Please visit the following ISA links for more information:

 

About the Presenter
Alex Tarter, Ph.D., technical director of cybersecurity at Ultra Electronics, 3eTI, is an expert and thought leader on new technologies and solutions for industrial and commercial applications for the protection of critical infrastructure. In addition to the work he does developing security solutions, Alex performs vulnerability and cybersecurity work for military and industrial applications, having prepared more than 50 reports on various aspects of security, cryptography, and situational awareness for industry, U.K. Ministry of Defense and U.S. Department of Defense. He earned a doctorate from Lancaster University, and a master's of engineering from Imperial College London, and is a certified specialist in ISA 99/IEC 62443 cybersecurity fundamentals. He serves as a civilian advisory expert to NATO on Cyber Defense for the Industrial Resources and Communications Services Group.

 

Connect with Alex
LinkedIn


Related Posts

Exploring Zero Trust in Operational Technology

Zero trust has become the top approach for IT security, guiding how organizations worldwide design their ...
Muhammad Musbah Nov 1, 2024 7:00:00 AM

The Role of IoT in Streamlining Communication for Industrial Automation

The Internet of Things plays a vital role in transforming industrial settings. As we usher in Industry 4....
Ainsley Lawrence Oct 29, 2024 7:00:00 AM

Maximize Operator Situation Awareness During Commissioning Campaign

Learning Outcomes Explain the scenario that often occurs during the construction and commissioning of lar...
Daniel O'Duffy Oct 25, 2024 7:00:00 AM