Cybersecurity has become a given in everything that automation suppliers pursue. Where not so many years ago automation was sold with little regard to the ramifications of being connected, today suppliers are more accountable than ever for the security of their products.
Last week at the Honeywell Users Group (HUG) Americas in San Antonio, Texas, Honeywell was talking up its capabilities in the Industrial Internet of Things (IIoT) space, making a push for its âIIoT Readyâ products and services. That push for connectivity only makes cybersecurity that much more important.
âAll of this has to happen in a cybersecure manner,â said Vimal Kapur, president of Honeywell Process Solutions (HPS), during his keynote the first morning. âWe must make our products inherently and natively cybersecure.â
Regardless of what HPS is working on, cybersecurity will be an important consideration, Kapur noted in a separate briefing with industry press and analysts. âItâs going to be perfected, whether we build our products natively secure or add more layers of protection,â he said. âIt is going to take a while for people to accept that. This is not a slam dunk. But weâre doing everything that we should.â
Asked if customers are willing to pay for security, Kapur responded that they have become much more receptive to the value the added security brings. âWe have far more to offer now, and customers are buying it,â he said. âPeople are spending money, specifically where thereâs a high awareness.â
As an industry, we are doing things well with regard to cybersecurity and certainly better than before, according to Eric Knapp, HPSâs global director of cybersecurity solutions and technology. âBut most cybersecurity is still very reactive,â he said, noting that common techniques like antivirus, for example, is only as good as the signature that antivirus software uses. âAnd malware changes very, very quickly.â
Most manufacturers still think in terms of perimeter detection, such as firewalls or intrusion detection systems, Knapp said. âThese are great; we have to implement these controls,â he said. âBut itâs a very static and reactive approach to cybersecurity.â
USB protection
Attackers will always go after the path of least resistance. That easy path was once the networks, but manufacturers have figured that out, and hackers in turn have chosen a new path. âWeâve locked our networks down tight,â Knapp said. âBecause of that, we have to rely on things like removable media. The bad guys have figured this out too, and now malware comes in on USB drives.â
The well-known Stuxnet virus, which attacked the control system at an Iranian nuclear facility in 2010, used an infected USB flash drive to infiltrate the network. And yet people will still haphazardly insert unknown memory sticks into USB ports on the manufacturing floor.
âBecause we know that USBs are the No. 1 pathway to get into facilities today, we found a way to get in the middle of that path,â Knapp said, announcing HPSâs imminent launch of Secure Media Exchange (SMX), which lets users scan USB sticks to detect and remove malware.
Though removable media like USB sticks have become the most common way for attackers to gain access to the network, Honeywell knows that as it and others block the path to USB, hackers will just move on to something easier. âInformation has to flow,â Knapp said. âWe protect the network, and now theyâre using USBs. Once thatâs locked down, theyâll find another way.â
So a comprehensive approach remains important. Honeywell is looking at trends, doing more research and engaging with customers to develop new products such as the SMX.
âWeâre currently taking a very risk-based approach, which can show us where the biggest bang for the buck is, and we can focus the limited resources we have on those areas,â Knapp said. âA risk-based approach is very efficient by nature, and has a high reward, especially in the very beginning.â
But when you start prioritizing the things that really need to be done, you might find that there are a lot of really high-priority issues. More proactive approaches like whitelisting and antivirus software are steps in the right direction. But there are a lot of unknowns, Knapp said, pointing to the need for threat intelligence. âNot just understanding what the threats are, but operationalizing threat intelligenceâgetting information in a way you can actually act on it so itâs valuable to you,â he explained. âWeâve just started doing that at Honeywell, really embracing future cybersecurity approaches.â
At its cybersecurity research facility that it opened a little over a year ago in Duluth, Ga., Honeywell is taking what it knows about its control systems to find new ways to infiltrate and manipulate them. âWe want to be the people who discover the next big attack vector so we can protect against it,â Knapp said.
Honeywell has cybersecurity expertise of its own, and is also partnering with other companies like Intel Security, Cisco and Belden to provide a broad approach to security.
In February, HPS announced a partnership with Palo Alto Networks, with Honeywellâs Industrial Cyber Security business offering Palo Alto Networksâ Next-Generation Security Platform to industrial customers. At HUG, Honeywell announced the release of the latest version of its Risk Manager software to include inspection capabilities from Palo Alto. âPalo Alto Networksâ cutting-edge inspection technology is now integrated right inside Honeywellâs Risk Manager,â Knapp said.
Beyond the firewall
Palo Alto Networks was founded about a decade ago on a next-generation firewall, reinventing the concept from the ground up to integrate functionality into the same platform to increase performance and lower cost, said Del Rodillas, senior manager of SCADA and ICS product marketing for Palo Alto.
The work that Palo Alto Networks is doing with Honeywell includes that next-generation firewall along with other key technologies:
- Threat Intelligence Cloud submits suspicious payloads to the cloud, and analyzes whether theyâre malicious or benign. âItâs a mechanism to analyze things youâve never seen before and make a determination of their malicious or benign nature,â Rodillas said.
- Wildfire sandbox detonates these suspicious payloads. âA lot of organizations typically donât have this capability in their plants,â Rodillas said.
- Traps are a new product that could be used at endpoints like HMIs, historians or SCADA servers, Rodillas said. âRather than look at fingerprints, it looks more fundamentally at what that attack is doing." Tens of thousands of new signatures are identified each year, making it difficult to keep up with patches. Traps instead looks at the small subset of exploit techniques used. âForget about signatures,â Rodillas said. âTraps stop the core couple dozen exploit techniques. Even unknown threats are using that same core of techniques.â
- Cloud services are also available as a public or private cloud. The public cloud has the added benefit of some 10,000 users sharing their incidents, with protection getting distributed to all users, along with intelligence submitted through research teams and partners. A subset of users that donât feel comfortable submitting anything to a public cloud can still get the same sandboxing capabilities on their plant floor, and still get some benefits of shared intelligence.
The industry is seeing a divergence in cybersecurity philosophies, particularly beyond the IT/OT perimeter, with some organizations preferring a zero-trust architecture and others a more passive approach, Rodillas said. âWhether theyâre more inclined to passive monitoring or more segmentation at the core, we have that capability,â he said.
Though nothing else has been made public at this point, Palo Alto Networks is working with several other key automation suppliers, Rodillas said, as well as some startups that offer complementary security solutions.
About the Author
Aaron Hand
Editor-in-Chief, ProFood World

Leaders relevant to this article:
