Addressing Cybersecurity in Process Control

June 1, 2004
The importance of improving cybersecurity for manufacturing and computer control systems only recently has been widely recognized and, as a result, has not been addressed by many chemical companies.

To avoid events that could result in manipulation of controls within chemical sites, the Chemical Industry Data Exchange (CIDX) urges all chemical sector companies to review and take appropriate security measures.

In the past few years, the chemical industry has invested considerable effort in managing the physical risks of terrorism and other deliberate criminal acts against facilities. However, these efforts have focused primarily on site risks and have not focused on attacks via the company’s own computer systems—whether deliberate or random. Nor have they addressed how attacks of worms, Trojans and viruses have occurred and adversely impacted computer systems at operating manufacturing facilities.

A concerted, industry-wide effort to understand, anticipate and prevent cyber attacks is just now beginning to generate the traction needed. To avoid attacks, CIDX urges all chemical sector companies to review and take appropriate security measures.

Maintaining cybersecurity vigilance is an established discipline for commercial and business computer systems. For these areas, the practice deals with protecting valuable information from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it.

However, for process plants, cybersecurity vigilance includes protecting against adversaries who wish to disable or manipulate computers or their support systems in an effort to cause harm to the process equipment controlled by the system. Examples include opening/closing valves, starting/stopping equipment, and overriding alarm and trip settings. Cybersecurity countermeasures that protect the technology specifically are not adequate to protect against attacks on control systems.

Connections pose threats

Historically, computer control systems were separate from business and enterprise computer systems. Increasingly today, they are connected through networks, driven by the needs to communicate process information to business groups and the opportunity to intervene in manufacturing processes through the corporate intranet or the Internet.

More than ever, process control systems are exposed to penetration when they are connected to other networks or when there are provisions for remote access. Current control systems typically were not designed with public access in mind, so security is often poor, and these systems are vulnerable to attack because much of the technical information needed to penetrate them is readily available.

A link to a site on the Internet is a potential two-way street. Connecting control systems to networks or providing dial-up access without protections is like leaving the doors of your house unlocked. There may not be a problem immediately, but the likelihood of the house being burglarized or vandalized rises. Accessibility issues also affect other types of computer systems, including communications, access control, inventory control, power, transportation and financial systems.

One large chemical manufacturing company reported that firewalls recently installed to separate manufacturing and process control systems from the business network successfully stopped a recent round of virus attacks. None of the process control systems that were protected by a process control firewall became infected by the viruses that were common on the business network.

Responsible risk management mandates that this threat should be managed to protect the interests of employees, the public, shareholders, customers, vendors and the larger society. Proactive measures by companies can also forestall new and more prescriptive regulations that increase costs and impede business flexibility.

This article is drawn from a white paper of the Chemical Industry Data Exchange (CIDX), www.cidx.org, a trade association and neutral standards body focused on improving the ease, speed and cost of transacting business electronically between chemical companies and their trading partners.

See sidebar to this article: Companies should do the following

Sponsored Recommendations

Put the Plant Floor in Your Pocket with Ignition Perspective

Build mobile-responsive HTML applications that run natively on any screen.

Ignition: Industrial-Strength System Security and Stability

Ignition is built on a solid, unified architecture and proven, industrial-grade security technology, which is why industrial organizations all over the world have been trusting...

Iron Foundry Gains Competitive Edge & Increases Efficiency with Innovative Technology

With help from Artek, Ferroloy implemented Ignition to digitally transform their disconnected foundry through efficient data collection and analysis while integrating the new ...

Empowering Data Center Growth: Leveraging Ignition for Scalability and Efficiency

Data center growth has exploded over the past decade. Initially driven by organizations moving their computer assets to the cloud, this trend has only accelerated. With the rise...