4 Key Components of Industrial Control System Protection

June 8, 2021
Amid the ongoing rise in cyber-attacks on industrial companies, it’s worth revisiting four basic, yet critical aspects of industrial control system cybersecurity.

With the gas shortages stemming from the ransomware attack on the Colonial Pipeline Co. still fresh in our minds, coupled with the fact that most cybersecurity efforts tend to focus on IT assets like servers and workstations, efforts to spotlight key factors of industrial control system security are receiving more attention than ever.

A study of 312 security professionals, conducted by Tripwire (a cybersecurity technology supplier) found that 99% of security professionals report challenges with the security of their IoT (Internet of Things) and industrial IoT devices, and 95% are concerned about risks associated with these connected devices.

Tim Erlin, vice president of product management and strategy at Tripwire, said, “In the industrial space specifically, more than half (53%) said they are unable to fully monitor connected systems entering their controlled environment, and 61% have limited visibility into changes in security vendors within their supply chain.”

Read  more about the Colonial Pipeline cybersecurity breach along with expert recommendations on avoiding and mitigating such attacks.

Because the actors behind a cyber-attack tend to take the path of least resistance, the majority of cyberattacks that occur are not highly sophisticated, Erlin said. “In most cases, practicing basic security hygiene, adapted for the environment, is the most effective way to protect against major cyber events.”

Following are four basic hygiene principles, suggested by Erlin, that can help harden critical systems against a cyber-attack: 

  • Visibility: Increased connectivity of control systems requires that we expand the notion of visibility. A complete and up-to-date inventory of all the devices in your environment is the most basic starting point for securing them.
  • Secure configuration: Once you know what’s in your environment, you can work to make sure everything is configured securely at the onset. A misconfiguration in your environment is like leaving the front door unlocked for an attacker. Finding and addressing misconfigurations can dramatically reduce the risk of compromise.
  • Managing vulnerabilities: Vulnerabilities are flaws in a system that an attacker can take advantage of to gain access or make changes. Addressing vulnerabilities in control systems may require strategies other than applying a patch, such as network segmentation.
  • Incident response: Planning a response before you’re in the middle of a crisis is important. This includes determining who should be involved, what their roles should be, and how information will be communicated. It also means ensuring that you have the technical tools to understand what happened. Log data from the systems involved and change detection data can decrease incident response time. 

“The cybersecurity market is full of advanced technologies that promise to stop the most sophisticated attacks, but evidence shows that a consistent focus on these basics pays off,” said Erlin.

About the Author

David Greenfield, editor in chief | Editor in Chief

David Greenfield joined Automation World in June 2011. Bringing a wealth of industry knowledge and media experience to his position, David’s contributions can be found in AW’s print and online editions and custom projects. He is also the chief program architect of the annual Automation World Conference & Expo. Earlier in his career, David was Editorial Director of Design News at UBM Electronics, and prior to joining UBM, he was Editorial Director of Control Engineering at Reed Business Information, where he also worked on Manufacturing Business Technology as Publisher. 

Sponsored Recommendations

Why Go Beyond Traditional HMI/SCADA

Traditional HMI/SCADAs are being reinvented with today's growing dependence on mobile technology. Discover how AVEVA is implementing this software into your everyday devices to...

4 Reasons to move to a subscription model for your HMI/SCADA

Software-as-a-service (SaaS) gives you the technical and financial ability to respond to the changing market and provides efficient control across your entire enterprise—not just...

Is your HMI stuck in the stone age?

What happens when you adopt modern HMI solutions? Learn more about the future of operations control with these six modern HMI must-haves to help you turbocharge operator efficiency...