Ian Suhih - Industrial Control Systems (ICS): what to consider when protecting industrial assets from cyber threats? Part 1. Secure ICS Architecture design

Industrial Control Systems (ICS): what to consider when protecting industrial assets from cyber threats? Part 1. Secure ICS Architecture design
Название: Industrial Control Systems (ICS): what to consider when protecting industrial assets from cyber threats? Part 1. Secure ICS Architecture design
Автор:
Жанр: Техническая литература
Серии: Нет данных
ISBN: Нет данных
Год: 2021
О чем книга "Industrial Control Systems (ICS): what to consider when protecting industrial assets from cyber threats? Part 1. Secure ICS Architecture design"

Currently, the international cybersecurity environment is tense. While until recently, cyber threats were considered primarily in relation to the theft of confidential information and extortion, governments are now increasingly talking about cyber weapons and the possibility of physical damage to critical infrastructure. This can be achieved by attacking industrial control systems (ICS) that connect the world of information technology and real industrial processes. Traditionally, systems of this class were poorly protected from cyber threats, or not protected at all, which now puts entire industries at risk. This paper discusses practical issues of ICS protection and in particular, issues related to the design of secure ICS architectures.

Бесплатно читать онлайн Industrial Control Systems (ICS): what to consider when protecting industrial assets from cyber threats? Part 1. Secure ICS Architecture design


A Word from the Author

This paper is aimed primarily at managers responsible for the cybersecurity of process control systems, and engineers who are beginning their career in the field of industrial control system cybersecurity. It is designed to help understand the peculiarities of the practical application of international and national standards for the cybersecurity of the industrial control systems to help avoid architectural and gross technical errors at the start of projects, to highlight the main features of the protection of ICS. This paper can also be useful for industry experts as it can offer a new perspective on familiar things.

I sincerely hope that this work will help the reader to better understand the specifics of ICS cybersecurity and make our world a little safer.


The author would like to thank:

• Hubertus Storck

• Alexey Kuzichkin

• Dmitriy Pravikov

• Artem Zhiganov


Without your help, my professional journey would have been much more difficult.


Special thanks for the professional translation:

• Margarita Nazarovskaya


The paper is based on the scientific article " Development of secure architectures for process control systems" DOI: http://dx.doi.org/10.26583/bit.2020.2.08

1. Abbreviations

DCS – Distributed Control System

DMZ – De-Militarized Zone

HIDS – Host-based Intrusion Detection System

NIDS – Network Intrusion Detection System

IDS – Intrusion Detection System

HMI – Human to Machine Interface

IEC–International Electrotechnical Commission

ISO – International Standards Organization

OS – Operating System

SIS – Safety Instrumented System; equivalent to Instrumented Protective System (IPS)

USB – Universal Serial Bus

HDD – Hard Disk Drive

PLC – Programmable Logic Controller

DCS – Distributed Control Systems

PIZ – Process Information Zone

ICS – Industrial control Systems

BPCS – Basic Process Control Systems

IT – Information Technology

OT – Operational Technology

HSE – Health and Safety Executive (United Kingdom)

HMI – Human Machine Interface

SCADA – Supervisory Control and Data Acquisition System

MES – Manufacturing Execution System

APC – Advance Process Control

WSUS – Windows Server Update Services

DPI – Deep Packet Inspection

SIEM – Security Information and Event Management

WAF – Web Application Firewall

DCOM – Distributed Component Object Model

OPC – Open Platform Communications

EPP – End Point Protection

RD – Remote Desktop

NSA – National Security Agency (USA)

2. Introduction

For a long time, industrial control systems were isolated from the outside world and solved local technological process control tasks. In the face of fierce competition, businesses have come to realize that it is possible to achieve greater production efficiency, reduce costs, improve product quality and increase productivity by integrating the process control systems with enterprise systems. Thus, began the fourth industrial revolution, which continues to this day. Today, it is almost impossible to imagine an industrial process without automation and only a small part of these systems operate in isolation from the Internet or the enterprise network (air-gaped).

In the modern world, a lot depends on the operation of control systems: stable power generation, heat and water supply, production of goods, mining, oil and gas extraction, and more. Almost all the services that we use every day are made possible with the use of control systems. Can a modern enterprise work effectively for a long time without a control system? The answer to this question depends on the industry. Some segments are less dependent on control systems and can be managed manually. However, most enterprises are unable to effectively operate for a sufficiently long time without control systems. In this context, the control system can be compared to the Internet, which is used by more than half of the world's population, and majority of us today cannot do our jobs and cannot imagine our lives without Internet access.

The widespread adoption of automated process control systems and their criticality in terms of maintaining business continuity, as well as the reliability and quality of services provided, require special attention to the threats that can lead to disruption of the functioning of these systems.

Traditionally, when it comes to safety in manufacturing industries, functional safety, and some other aspects of the overall safety, which relate to the maintenance operations and occupational safety, are addressed first. For a long time, this was enough, but the fourth industrial revolution brought not only benefits but also new risks associated with cybersecurity. An industrial control system connected to an enterprise network or the Internet is an easy target for an attacker if the connection and protection is not built in accordance with best practices.

Implementing best practices and local and/or international standards to protect ICS is a complex approach where various groups of specialists must be involved. These specialists must overcome several obstacles:


1. Lack of knowledge. Traditionally, control engineers do not have sufficient knowledge in the field of cybersecurity or information technology (IT) while IT and cybersecurity engineers do not understand the needs and features of ICS. To create a reliable and secure ICS and/or to appropriately adapt the standards to a specific system, the staff should possess expert knowledge in IT, ICS, and cybersecurity. Simultaneously, the approaches of control engineers and cybersecurity experts in solving problems may have opposite directions. So, a compromise between working staff must be found.


In April 2020, a survey of the expert community was conducted to determine the size of the systems for which the use of centralized cybersecurity management tools becomes justified. The survey has shown that 80 % of the audience were cybersecurity engineers and experts, 20 % were control engineers and middle-level managers. The spread of results was significant, which indicates that there is no consensus among the representatives of the expert community. Based on the survey results, I would like to highlight the following trends that illustrate some differences in approaches:


• Control engineers are less likely to use centralized cybersecurity. On all issues, they voted that services are either not needed at all or are needed for extensive systems. These results indicate the reluctance of control engineers to add new services to classic ICS.


• Cybersecurity engineers are more inclined to use centralized cybersecurity and consider their use justified even for small systems. This is most likely because the use of centralized cybersecurity management tools can significantly reduce labour costs for configuration and management of the system, analysis of incidents, and more.


С этой книгой читают
Руководителям компаний, занимающихся выпуском оборудования, главным конструкторам по аппаратам переработки нефти и газа и для нефтехимии из проектных институтов и заводов-изготовителей.Для того, чтобы ответить на вопрос как будут развиваться конструкции аппаратов, нужно проанализировать развитие технологий, то есть процессов, под которые аппараты проектируются, и посмотреть развитие методик прочностного и технологического расчетов и технологий не
В книге о методах сепарации пылевидных материалов представлен обзор конструкций устройств для классификации пылевидных материалов, в том числе пылевидных отходов
Искусственный интеллект наделал много шума и спекуляций. Кто-то считает его очередным мыльным пузырем, другие же опасаются потерять работу. Крупнейшие западные консалтинговые агентства строят образ ИИ как главного спасителя бизнеса в эпоху кризисов. Из этой книги вы узнаете реальное положение дел: что такое ИИ, что он может, а чего нет, какие технические, организационные и психологические проблемы с ним связаны, и чего нам ждать в ближайшие 10—20
Оперативное обслуживание и грамотное управление помогают не только улучшить обслуживание, но и сэкономить значительные средства.
Михаил Владимирович Родзянко был председателем Государственной Думы третьего и четвертого созывов (с 1907 по 1917 год). Николай II именно его обвинял в крушении монархии, а императрица Александра Федоровна предлагала «повесить Родзянко» наряду с другими депутатами Думы.В своих воспоминаниях Родзянко рассказывает, почему он добивался отречения царя, в чем причины конфликта Думы с Николаем II и Александрой Федоровной, с рядом царских министров, как
«Это все Божья милость, что будущее сокрыто от нас, и мы не знаем заранее о будущих ужасных несчастьях и испытаниях; тогда мы не смогли бы наслаждаться настоящим, и жизнь была бы лишь длительной пыткой».(Из письма императрицы Марии Федоровны сыну, великому князю Георгию Александровичу.)Датская принцесса Мария-София-Фредерика-Дагмар – супруга российского императора Александра III. Имя Марии Федоровны она получила с принятием православия. Ее уважал
Сборник рассказов "Красноярск 2045", что стал одним из самых значимых эпизодов в жизни и творчестве Тимура Агаева! Перестрелки, интриги, да и различного рода выживание прилагаются. Содержит нецензурную брань.
Не ходи в ту избушку, там живет ведьма! Да только кто верит в эти бабушкины сказки?Не бери ничего из рук старухи, это опасно! А что делать, если яблоко будто само скользнуло в мои ладошки?И вот уже моя жизнь полна странностей, а таинственный незнакомец, который называет себя моим куратором, дает непростые задания и делает предложения, от которых никак не откажешься. И, черт возьми, ну почему он такой привлекательный?