What is the state of ICS cyber security technology
June 21, 2011
Much has transpired since I first got involved in ICS cyber security in 2000.At that time, cyber security was almost universally viewed as an IT problem. There has been a tremendous increase in awareness of the issue.
Much has transpired since I first got involved in ICS cyber security in 2000.At that time, cyber security was almost universally viewed as an IT problem. There has been a tremendous increase in awareness of the issue. When I held the first Control System Cyber Security Conference in 2002, the only other ICS cyber security discussions were at the ISA Expo where I was holding panel sessions.That has certainly changed with numerous conferences, articles from many experts (including many I have never heard of), and legislation now aimed at securing ICSs.
There has been significant improvement in securing the Windows-based Human-Machine
Interface - HMI. There are now many companies offering firewalls, IDS/IPS, and other Windows solutions that have been modified (I hope) for ICS applications.Assuming these solutions have been tested in ICS applications, this should certainly help.The down side is applying IT solutions that have not been tested in ICS applications. Unfortunately, this has already happened with negative consequences to the ICSs. The appropriate technologies applied appropriately (notice both need to be addressed) should help reduce the risk from typical IT threats either aimed at the ICS HMI or through the unintended consequences of connecting ICS HMIs to Corporate networks (lack of airgaps).
There has also been the establishment of a cottage industry in compliance monitoring and
reporting to meet NERC CIP requirements.
However, work is still needed in securing the Programmable Logic Controllers (PLCs) and other
resource-constrained, deterministic field devices that could cause devastating
failures and loss-of-life. This includes both Internet Protocol (IP) and serial
communications. Many of the high impact cyber incidents to date including
Stuxnet and Aurora were control system issues that would not be addressed by existing
IT or even many of the ICS HMI solutions. There is also a need to
identify what an ICS cyber attack would look like (Stuxnet was obviously not
detected as it was in the wild for more than a year). As with the HMI, the
appropriate ICS technologies applied appropriately should help reduce cyber risk and improve safety and reliability. I will have several vendors presenting control system solutions that I believe address important security issues at the September ACS Conference.
The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...
Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...
Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...
Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...