Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Tutorial

Industrial information
system security
Standards for securing industrial automation systems
Part 3

Martin Naedele, Dick Oyen

Part 2 of this three-part tutorial on information system security in industrial networks


explained the different types of malware and suggested how an automation system
could be defended against them.

This final installment looks at various initiatives that have been started over the last
couple of years by different groups to create standards and other forms of guidance
to secure industrial automation systems. An overview of a number of those initiatives
and their work products is presented, and the approach taken by IEC TC65 WG10 to
produce technical blueprints for securing certain control system scenarios is
explained.

ABB Review 4/2005 69


Industrial information system security

Tutorial

C urrently there is a flood of infor-


mation available on information
system security in general. On top of
ISA is entitled to produce standards
for the process industry with national
validity in the US. Many ISA standards
Retrofitting security mechanisms in
existing plants with commercially
available components without actual-
this, there are some automation ven- are used internationally as best prac- ly prescribing a specific architecture.
dor white papers that explain certain tices or, such as S88 and S95, adopted The processes to operate the under-
aspects of locking down their systems. as international standards. lying management system and ad-
However, there is a serious lack of ministrative processes.
impartial and easily accessible guid-
ance on how to systematically secure
Standards outlining how The actual security architecture and
automation and control systems to systematically secure processes will likely be customized
against electronic attacks. automation and control for specific plants.

There is no doubt that standards in systems against electronic IAONA


this area would be very beneficial for attacks would be very The Industrial Automation Open Net-
both automation users and automation working Alliance (IAONA) is an inter-
vendors, thus enabling them to:
beneficial for both est group of industrial communication
Estimate the effort required to im- automation users and system users and manufacturers. Its
plement, maintain, and operate se- automation vendors. Joint Technical Working Group Securi-
curity mechanisms and processes. ty2) has developed a Security Data
Specify the security objectives for Sheet which is intended to serve as a
their plant and the security func- SP99 started its work in 2002. As a first template for automation system and
tionalities and measures that have step, it produced two technical reports
to be provided by vendors and sys- that were published in spring 2004. The
tem integrators. first report “Security Technologies for Table 1 Secutity initiatives
Compare the threat coverage and Manufacturing and Control Systems” [3]
cost of offered security solutions. is a comprehensive survey of what is
CIDX (http://www.cidx.org/CyberSecurity/ )
Implement and operate cost effi- state-of-the-art in security technologies
creates procedural security guidance for the
cient security mechanisms across and mechanisms, with comments on chemical industry. Its work is aligned with
multiple plants and locations in the their applicability for the plant floor. It ISA SP99. CIDX is mostly active in North
enterprise. covers: authentication and authoriza- America.
Be sure that their defense against tion; filtering/blocking/access control; NAMUR (http://www.namur.de/en/694.php)
IT-based threats corresponds to encryption and data validation; audit, provides guidance on secure usage of net-
state-of-the-art solutions. measurement, monitoring, and detec- working technology for the process indus-
tion; operating systems and software; try. NAMUR is mostly active in Germany/Eu-
Vendors and system integrators will be and physical security. Each technology rope.
able to: is evaluated with regard to the follow- NERC (http://www.nerc.com/ ) is the North
Anticipate security requirements ing questions: Addressed security vul- American self-regulation authority for power
and develop corresponding func- nerabilities; typical deployment; known utilities. Compliance with NERC 1200 and
tionality. weaknesses; use in an automation envi- successor CIP 002…009 standards on
Create security architectures that ronment; future directions; recommen- security management with their strong
may be reused across multiple proj- dations; and references. focus on processes and documentation is
ects and customers. This reduces compulsory for North American power utili-
costs in proposal writing, engineer- The second report “Integrating Elec- ties.
ing, and the purchasing of third tronic Security into the Manufacturing CIGRE (http://www.cigre.org), the Interna-
party security devices and applica- and Control Systems Environment” [4] tional Council on Large Electric Systems
tions. presents recommendations for a secu- addresses IT security considerations in a
rity architecture and describes the ad- number of its working groups.
Major standardization initiatives ministrative issues and processes for PCSRF (http://www.isd.mel.nist.gov/proj-
The following survey of industrial se- introducing a security management ects/processcontrol/ ), the Process Control
curity standardization initiatives is system in industrial plants. The ap- Security Requirements Forum, promotes
adapted from [1] and [2]. proach in this report is inspired by security certification of future control system
ISO/IEC 17799 [5]. It contains sections components according to ISO/IEC 15408
(“Common Criteria”). It is driven by the US
ISA S99 on developing a security program,
National Institute of Standards and Technol-
The intention of the ISA (Instrumenta- policies, risk assessment, audits and
ogy, the US national ISO/IEC 15408 certifi-
tion, Systems, and Automation Soci- testing, developing, selecting, and
cation authority.
ety) Committee SP99, “Manufacturing procuring, countermeasures, as well
PCSF (http://www.pcsforum.org/ ), the
and Control Systems Security”1) is to as examples for policies and forms.
Process Control System Forum, was estab-
create guidance documents and a
lished 2004 as a meta-initiative to promote
standard (S99) on introducing IT secu- Since the summer of 2004 SP99 has
information sharing between all the other
rity to existing industrial control and been working on the S99 standard.
initiatives on the topic.
automation systems. S99 focuses on:

70 ABB Review 4/2005


Industrial information system security

Tutorial

device vendors to document the secu- Security management on the plant floor nature, it is not a normative standard
rity and communication related fea- according to ISA S99 against which compliance can be
tures and requirements of their indi- The ISA SP99 technical report measured. The reader determines the
vidual products. This information can TR99.00.01 [3], “Security Technologies applicability of the information to the
serve as valuable input for the au- for Manufacturing and Control Sys- specific case. It is an excellent docu-
tomation security architect as he de- tems” provides guidance on the appli- ment for those starting to determine
signs and configures the necessary cability of a broad and inclusive range security measures and those with
security mechanisms for the plant. of security technologies. Its advice experience. TR99.00.01 continues to
The benefit of such a Security Data comes from the combined experience be updated but its content will not be
Sheet is that it collects, at a single of security experts from automation covered by the S99 standards.
location, concise security relevant system vendors and users. As the in-
information that is otherwise often formation presented is analytical in As of October of this year, drafts of
hard to obtain from vendor literature. two of the four parts of the S99 stan-
dard are almost ready for public
IEC review.
1 Cyber Security Management System.
In early 2004 the IEC Technical Sub-
Committee 65C (Digital Communica- Part 1 defines terms and describes the
tions), through its working group models used in discussing security in
WG13 (Cyber Security), started to automation systems. Part 2 advises
Plan
address security issues - within the 1. Importance of Cyber Security
how a cyber-security management
IEC 61784 standard – for field buses in Business
system (CSMS) can be established.
and other industrial communication 2. Scope of a Cyber Security There are 18 key elements in a CSMS
networks. These issues are outlined Management System which are structured in a life cycle
in a new part 4 entitled “Digital data 3. Security Policy that is constantly repeated through
communications for measurement and 4. Organizational Security four phases: Plan, Do, Check, and
control – Profiles for secure communi- 5. Personnel Security Act. The CSMS is provided by the
cations in industrial networks”. 6. Physical and Environmental Chemical Industry Data Exchange
Security (CiDX) [7], which adapts the four
What became evident during this phases of the British Standard BS
work was that security issues in the 7799-2:2002 [6] to automation systems
automation system cannot be solved and defines the 18 key elements. The
Do
by protecting communication alone CSMS and its elements are shown in
7. Risk Identification,
and by looking only at the field level. 1 . Its cyclic nature is implicit in step
Classification, and Assessment
Instead, the working group started to 18 in which the security program itself
8. Risk Management and
specify state-of-the-art secure realiza- Implementation
is modified according to lessons
tions of certain common automation 9. Incident Planning and
learned in the course of the preceding
networking scenarios, such as dial-up Response
elements.
remote access. These descriptions, 10. Communications, Operations,
called requirement sets, contain a and Change Management Plan phase:
product independent specification of 11. Access Control Security planning begins with making
technical mechanisms in the context 12. Information and Document a business case so that top manage-
of a best-practice security architecture, Management ment can set a clear top-level policy
as well as guidance on the configura- 13. System Development and that mandates the security program.
tion and operation of these mecha- Maintenance
nisms. The approach is described in 14. Staff Training and Security Organizational Security is planned
greater detail below. Awareness and this takes into account all of the
15. Compliance departments and people that are
Consequently, the work of the group involved with the control system.
was moved to TC65 WG10 to align It identifies roles and establishes
the actual and necessary work with Check responsibilities relative to security.
the IEC committee mandate. The com- 16. Business Continuity Plan
pleted standard IEC 62443, entitled 17. Monitoring and Security relates to people: those who
“Security for industrial process meas- Reviewing CSMS have assets to protect, those who are
urement and control – Network and expected to protect them, and those
system security” is expected in 2006. who might compromise those assets.
The final voting for international va- Act Personnel Security defines personnel
lidity will take place during the first 18. Maintaining and policies to estimate and maintain the
half of 2007. Implementing Improvements trustworthiness of those who are giv-
en greater access to the assets. Physi-
Some other security initiatives are cal and Environmental Security must
briefly described in Table 1 . also be planned. Cyber security is

ABB Review 4/2005 71


Industrial information system security

Tutorial

based on an assumption that there are munications, system operations, and nel to the security policies and proce-
substantial (not absolute) barriers change management. dures must be measured through con-
against physical attack. tinuous monitoring, and periodically,
Access control defines the privileges through audits. Compliance must also
Security risks are identified, classified, that accompany specific roles. It also take into account external requirements
and assessed in the planning phase. defines the procedures that limit peo- such as those of customers, contractual
Detailed instructions about how to do ple’s access to activities and informa- partners, and regulatory agencies.
this is provided in S99 and the materi- tion to which they are privileged.
al that it references. Authentication means are determined Check phase
which will ensure that a particular The Check Phase includes developing
Do phase user (person or software) has the a Business Continuity Plan and fol-
Risk assessment leads directly into the necessary access authorization. lowing it. This plan establishes how
Do Phase. Using the risk assessment, the company will operate through in-
security resources can be efficiently Information and Document Manage- cidents that result in serious damage,
applied to real vulnerabilities. ment identifies the security classifica- plant outage, and possibly community
tion of data and specifies safeguards. catastrophe. The lessons learned from
Procedures are established that plan Security issues of developing and the CSMS activities are reviewed in
the response to potential incidents. maintaining the system are also han- the Check Phase.
Response planning must include when dled by policies and procedures.
it becomes necessary to notify govern- Act phase
ment officials of a significant threat to Staff must be trained in the relevant As the CSMS is a cyclic process, the
the community. security procedures and all personnel security program is revised according
should undertake regular refresher to the review in the Check Phase.
Overall management policies and pro- courses on general security precautions. S99 Part 2 provides more details as
cedures are established to cover com- Compliance of departments and person- well as 19 steps for establishing a

2 Modular security architecture. Each can be mapped to certain components of the automation system and its network.

ECI SED IRA IOC


Standalone device Remote access client Remote control center
(e.g. maintenance) (e.g. backup, or a different plant)

Semi-public network Public network


(e.g. enterprise network) (e.g. Internet) PSM

CNH
Control center/HMI
PEC
Service laptop

ULCC Control network (control center upper level)

ACI

Application servers Control servers

LLCC
Control network (control center lower level)
automation automation
cell cell AFD
controller controller

FC

Control network (field level)

72 ABB Review 4/2005


Industrial information system security

Tutorial

CSMS. Part 3 aims at providing guid- should, at the same time, allow for servers. ULCC datails network orient-
ance on how to operate the CSMS. different technical solutions. One goal ed security mechanisms specific to
is that it will be possible to meet the this part.
Technical security architecture based on requirements of the standard using Lower Level Control center (LLCC):
IEC 62443 products and technologies that are LLCC outlines network oriented secu-
IEC 62443 mainly addresses – on a commercially available today. The re- rity mechanisms in the part of the
system level – technical aspects of the quirements can also be applied to cur- control network connected to con-
security architecture, and thus compli- rent and legacy systems and they can trollers and PLCs.
ments product oriented initiatives like be scaled down for systems where an Field Control (FC): FC outlines network
IAONA, and process guidance provid- analysis has indicated they represent a oriented security mechanisms in the
ed by SP99 and NERC. low risk for both the enterprise and part of the control network connected
society. to field devices.
Control network host (CNH): CNH ex-
With the ongoing stan- The working group foresees the fol-
lowing modules:
plains how automation workstations
and servers for operations and engi-
dardization efforts for Enterprise – control net interconnect neering can be secured against attacks
Industrial IT security (ECI): ECI defines the security architec- from insiders and malware, for exam-
ture for non-real-time dataflow be- ple.
processes and architec- tween a control network and an enter- Automation field device (AFD): AFD ex-
tures, plant managers prise network, preferably unidirec- plains how field devices and embed-
tional out of the control network. ded controllers can be secured.
have a real chance to im- Interactive remote access (IRA):
plement state-of-the-art IRA details the security architecture Each module describes: a use case to
and cost-efficient informa- needed so that parts of the control which it applies; threats that are ad-
system can be accessed remotely (ie, dressed or not addressed; the underly-
tion system security. via telephone dialup or Internet) for ing assumptions; the requirements;
perhaps engineering or expert diagno- and the party (automation vendor,
sis. system integrator, or plant owner) re-
The basic idea of the IEC approach is Inter control center connect (ICC): sponsible for meeting each of the re-
that of a modular security architec- ICC describes how communications quirements. The core part of each
ture. Each module corresponds to a between fixed control centers over module is the requirement set and it
certain usage or communication sce- public networks can be secured. contains between 20 and 50 require-
nario and can be mapped to certain Stand-alone embedded device (SED): ments, depending on the module.
components of the automation system SED outlines the security requirements
and its network 2 . Each module is for an automation device that is not Each requirement consists of a norma-
represented by a requirement set contained in a security zone and for tive statement, optionally including
specified in the standard. Some of the which a full-blown security perimeter scale-down alternatives, a rationale,
requirements, as well as the physical would not be cost efficient, eg, a and in many cases one or more appli-
or logical components they refer to, pole-top Intelligent Electronic Device cation notes. The rationale is an es-
are common to multiple modules. (IED). sential element, as it enables the read-
Security architecture modules can and Portable engineering computer (PEC): er to make an informed decision
should be combined to suit the specif- PEC details how a control system can about the importance and applicabili-
ic usage and threat situation of an be protected against threats originat- ty of the requirement. The application
automation system. The standard will ing from portable computers that may notes provide technical guidance on
provide guidance on the priority of be moved back and forth between how the requirement could be real-
modules for situations where a com- public networks and the control sys- ized.
plete implementation of the standard tem
is not possible due to budget limita- Portable storage media (PSM): An au- The IEC 62443 standard describes the
tions for initial implementation and tomation system may be exposed to “what” and “why” of the security ar-
ongoing maintenance. malware infections through storage chitecture, but the “how” is specific to
media like memory sticks or CDs. PSM an individual site and system and is
The requirements will be formulated explains how this can be prevented. therefore left to the engineering judg-
in a way that can be used as the basis Automation cell interconnect (ACI): ment of the plant experts and the au-
for Requests for Proposals (RFPs) for ACI outlines the security architecture tomation/IT integrator.
data communication standards, and required for protected communication
offers, as well as security audits. They between automation cells within a Summary
control network. With the ongoing standardization ef-
Footnotes
Upper Level Control center (ULCC): forts for Industrial IT security process-
1) http://www.isa.org/MSTemplate.cfm?Micro- Part of a control network is connected es and architectures, specific to con-
siteID=988&CommitteeID=6821 to operator workstations, “historians ”, trol and automation systems, plants
2) http://www.iaona.org/home/jtwg-se.php application servers and connectivity managers now have a real chance to

ABB Review 4/2005 73


Industrial information system security

Tutorial INDEX 2005

implement state-of-the-art and cost-


ABB ABB
efficient information system security. Review
The corporate technical journal
of the ABB Group

www.abb.com/abbreview
Review
The corporate technical journal
of the ABB Group

www.abb.com/abbreview

1 / 2005 3 / 2005

Pioneering Sustainability
spirits
The standardization initiatives de-
scribed above have so far been char- A revolution in high dc current measurement Sustainability is an essential part of

acterized by a general recognition that 1/2005: 3/2005:


page 6
ABB’s business
page 6

Team-mates: MultiMove functionality heralds Beating the greenhouse effect with


a new era in robot applications emissions trading
page 26 page 14

pragmatic solutions are needed to Best innovations 2004


page 43
Pioneering spirits Safety management in process industries –
the ABB approach
page 51 Sustainability
serve the industry, as well as very a a

constructive collaboration among au- A revolution in high dc Sustainability in ABB 6


tomation vendors and end users so current measurement 6 Healthy, safe and productive 10
that this objective is achieved. Form and Function 11 Emissions trading 14
The perfect cast 14 SF6 technology 20
ABB is a major contributor to various DryQ – Dry and silent 17 Energy efficiency 22
security standardization initiatives. PSGuard contributes Networking 28
to UCTE grid reconnection 22
The company offers products and so- Not on my watch 31
Team-mates 26
lutions that are compliant to evolving Leaner, fitter, smarter 36
Instant comfort 30
standards, and provides assistance to HVDC 42
Satisfaction guaranteed 33
its customers in applying these stan- Safety management in
Panoramic projection 37 process industries:
dards to specific plants and sites. Part 1 47
Digging into the archives 40
Part 2 51
Best innovations 2004 43
Energy efficiency
Don’t touch: ABB’s new
passive voltage indicator 52 Green shipping 54
Wireless Ad-hoc networks 54 The ABB turbocharger 58
Autonomic computing 55 Boosting supply 63
Cut and dry 66
Unplugged but connected –
Part 1. 70
Industrial information
system security – Part 2 74
Martin Naedele
ABB Switzerland, Corporate Research
martin.naedele@ch.abb.com

Dick Oyen
ABB ABB
ABB US, Corporate Research Review
The corporate technical journal
of the ABB Group
Review
The corporate technical journal
of the ABB Group

dick.oyen@us.abb.com
www.abb.com/abbreview www.abb.com/abbreview

2 / 2005 4 / 2005

University Innovation –
and industry co- the DNA
operation of business
References 2/2005: 4/2005:
Turning Europe into a dynamic and Best innovations 2005

[1] Naedele, M.: Standardizing Industrial IT Security – University and Innovation –


competitive knowledge-based economy page 15

page 6

The importance of working together with Power lines that don’t spoil the landscape
industry: university viewpoints page 25

A First Look at the IEC approach, 10th IEEE Inter-


page 22

Looking ahead:
The future of power system control
page 35
industry cooperation The magnetic stabilizer that saves on zinc
page 60
The DNA of business
national Conference on Emerging Technologies a a

and Factory Automation (ETFA 05), Catania, Sep-


Closing the gap 6 Looking back to look forward 6
tember 2005
Welcome to our world 10 Fruits of innovation 9
[2] Dzung, D., Naedele, M., von Hoff, T., Crevatin, M.:
Security for industrial communication systems, The MIT experience 14 Best innovations 2005 15
Proceedings of the IEEE, Vol. 93 (6), June 2005, Leaders of tomorrow 18 Grid flexibility 21
pp 1152–1177 University co-operation 22 Light and invisible 25
[3] ISA SP99: Security Technologies for Manufactur- City of learning 29 Convergence in the control room 30
ing and Control Systems, Instrumentation, Sys- Let’s work together 32 Powerful and stable 33
tems, and Automation Society, ISA-TR99.00.01- Looking ahead 35 High voltage assembly 36
2004, March 2004, Value for money 39 Breaking to the front 39
[4] ISA SP99: Integrating Electronic Security into the
Root cause 44 Ironing out resonances 42
Manufacturing and Control Systems Environment,
Predictable assembly 49 Age is no issue 47
Instrumentation, Systems, and Automation Soci-
Hot stuff 55 The process “copper” 51
ety, ISA-TR99.00.02-2004, April 2004,
[5] ISO: Information technology – Code of practice for
Grids united 59 Control loops: pleasure or plague? 55
information security management, ISO/IEC Simulated reality 62 Stabilizing influence 60
17799:2000, December 2000, Industrial information Live(ly) neighbours 64
system security –Part 1 66
[6] British Standards Organization: Information secu- Unplugged but connected
rity management systems – Specification with
Part 2 65
guidance for use, BS 7799-2:2002, September Industrial information
2002
system security – Part 3 69
[7] Chemical Industry Data Exchange (CiDX): Guid-
ance for Addressing Cybersecurity in the Chemi-
cal Sector, Version 2.0, December 2004.

74 ABB Review 4/2005

You might also like