Addressing Cybersecurity in Process Control

June 1, 2004
The importance of improving cybersecurity for manufacturing and computer control systems only recently has been widely recognized and, as a result, has not been addressed by many chemical companies.

To avoid events that could result in manipulation of controls within chemical sites, the Chemical Industry Data Exchange (CIDX) urges all chemical sector companies to review and take appropriate security measures.

In the past few years, the chemical industry has invested considerable effort in managing the physical risks of terrorism and other deliberate criminal acts against facilities. However, these efforts have focused primarily on site risks and have not focused on attacks via the company’s own computer systems—whether deliberate or random. Nor have they addressed how attacks of worms, Trojans and viruses have occurred and adversely impacted computer systems at operating manufacturing facilities.

A concerted, industry-wide effort to understand, anticipate and prevent cyber attacks is just now beginning to generate the traction needed. To avoid attacks, CIDX urges all chemical sector companies to review and take appropriate security measures.

Maintaining cybersecurity vigilance is an established discipline for commercial and business computer systems. For these areas, the practice deals with protecting valuable information from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it.

However, for process plants, cybersecurity vigilance includes protecting against adversaries who wish to disable or manipulate computers or their support systems in an effort to cause harm to the process equipment controlled by the system. Examples include opening/closing valves, starting/stopping equipment, and overriding alarm and trip settings. Cybersecurity countermeasures that protect the technology specifically are not adequate to protect against attacks on control systems.

Connections pose threats

Historically, computer control systems were separate from business and enterprise computer systems. Increasingly today, they are connected through networks, driven by the needs to communicate process information to business groups and the opportunity to intervene in manufacturing processes through the corporate intranet or the Internet.

More than ever, process control systems are exposed to penetration when they are connected to other networks or when there are provisions for remote access. Current control systems typically were not designed with public access in mind, so security is often poor, and these systems are vulnerable to attack because much of the technical information needed to penetrate them is readily available.

A link to a site on the Internet is a potential two-way street. Connecting control systems to networks or providing dial-up access without protections is like leaving the doors of your house unlocked. There may not be a problem immediately, but the likelihood of the house being burglarized or vandalized rises. Accessibility issues also affect other types of computer systems, including communications, access control, inventory control, power, transportation and financial systems.

One large chemical manufacturing company reported that firewalls recently installed to separate manufacturing and process control systems from the business network successfully stopped a recent round of virus attacks. None of the process control systems that were protected by a process control firewall became infected by the viruses that were common on the business network.

Responsible risk management mandates that this threat should be managed to protect the interests of employees, the public, shareholders, customers, vendors and the larger society. Proactive measures by companies can also forestall new and more prescriptive regulations that increase costs and impede business flexibility.

This article is drawn from a white paper of the Chemical Industry Data Exchange (CIDX), www.cidx.org, a trade association and neutral standards body focused on improving the ease, speed and cost of transacting business electronically between chemical companies and their trading partners.

See sidebar to this article: Companies should do the following

Sponsored Recommendations

Why Go Beyond Traditional HMI/SCADA

Traditional HMI/SCADAs are being reinvented with today's growing dependence on mobile technology. Discover how AVEVA is implementing this software into your everyday devices to...

4 Reasons to move to a subscription model for your HMI/SCADA

Software-as-a-service (SaaS) gives you the technical and financial ability to respond to the changing market and provides efficient control across your entire enterprise—not just...

Is your HMI stuck in the stone age?

What happens when you adopt modern HMI solutions? Learn more about the future of operations control with these six modern HMI must-haves to help you turbocharge operator efficiency...