Cybersecurity Concept Image 3 63851dfeca4ff

Cope with change—protect PLCs

Dec. 1, 2022
Cybersecurity week 2022—day 4: Huffman Engineering advises following real-life and IT examples

Beyond simply multiplying, cyber-probes, -intrusions and -attacks are growing more sophisticated, and requiring users to protect entire systems instead of single access points.

“Cyber-criminals used to focus on taking control of a PLC, but now we’re seeing them attempt to gain access to the entire network through PLCs. That kind of access can be absolutely debilitating to a plant or public utility,” says Keith Mandachit, PE, engineering manager at Huffman Engineering Inc., a CSIA-certified system integrator in Lincoln, Neb. “These hackers are attempting to exploit the network through the engineering workstations, and any disparity between your IT and OT operations can open a window of opportunity for an attack we’ve seen called ‘Evil PLC attack.1’ ”

To handle the everchanging risk posed by cyber-threats, Mandachit reports that users must constantly and consistently educate and communicate among their staffs, contractors and clients. “Looking outside of your organization to learn of real-life examples and passing that knowledge onto you own stakeholders is imperative. The stakes are high as these attacks grow more sophisticated, so it’s not just about controlling your own internal processes anymore,” he explains. “Limiting access points is key to defending against attackers weaponizing PLCs. This includes managing the risk of allowing a third party’s external team to connect a laptop to your network and systems."

Mandachit reports that cybersecurity mitigation strategies should include:

  • Conduct a cybersecurity risk assessment (RA) and asset inventory to determine risk tolerance and budgetary plan;
  • Communicate with all stakeholders, such as operators, IT, automation engineers and management;
  • Limit access to PLCs with policies and procedures that control access, and allow only approved and vetted personnel access to applicable systems;
  • Monitor network traffic and analyzing it for unusual events, such as uploading and downloading PLCs with automated notifications;
  • Segment networks to reduce the risk of an attack infecting overall networks; and
  • Stay current with patches and other software updates.

“Reputable system integrators will regularly monitor and communicate updates with customers,” adds Mandachit. “These strategies used in conjunction can provide a unified front across your organization to help combat attacks.”

Converge and coordinate 

Just as cooperation between OT and IT can aid all kinds of digitalization, it’s also one of the most crucial ways to achieve cybersecurity.

“It’s always a challenge to get the IT and OT departments to work together. Both have important initiatives to accomplish but finding an effective balance for the entire organization can be difficult,” says Mandrachit. “Vulnerabilities can be exposed when the IT and OT departments can’t find the middle ground between security risk and production. If OT won’t budge on allowing the latest security updates, that exposes them to the risk of the newest cyber-attacks. If IT doesn’t recognize the importance of a continuous schedule, production goals can’t be met. These two have to find a middle ground, and often a certified control system integrator, who understands the importance of both areas when it comes to cybersecurity, can stand in the gap and help bring them together.”

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...