The Industrial Control System (ICS) is a general term used for any distributed control system (DCS), programmable logic controller (PLC), supervision and data acquisition (SCADA) or automation systems used in industrial environments critical infrastructure. ICS security is designed to protect the system from any interruption whether intentionally or unintentionally, which may lead to undesirable ICS operations.
Industrial control system security
ICS security can be broadly categorized as cyber security. Although the word “cybersecurity” implies its meaning is to see only the “internet” connection, which does not happen when it comes to the ICS environment.
The ICS security requirements are searched for more now that the number of threats has increased. The rules are in force and the company has legal, moral, and obligations to limit the risk. IEC 61511: 2016- Functional Security – The security system used for the process industry sector also demands security assessment of the security control system (SIS) in the control system.
Due to recent objections to cyberattacks, ICS security has received more attention as a requirement to protect against external hackers. However, cyber security is part of ICS security; threats to modern control systems come in many forms.
The threats may be external or internal and may be categorized as deliberate, deliberate and unintentional, or unintentional. The tremendous threats are hackers (professional, amateur, script kiddies), rival business competitors, rival / state organizations. Typical internal threats are wrong actions, inappropriate behavior, disgruntled employees, and similar activities.
The latest ransomware attack has beaten the myth that most ICS members “are not ours.” Another typical myth is, “Our ICS is not on the internet,” “We have a firewall,” and “We have SIS.” Believing that ICS can not be a target will cause problems and are not properly protected from internal / accidental threats.
To protect against external threats, more need to be done than just reinforcing the network. Not all internal threats can be avoided by strengthening internal procedures / policies. Optimal ICS security is achieved by strengthening the network and supporting the right policies and procedures.
Identify ICS security vulnerabilities
ICSs are used to be stand-alone systems, but not anymore. ICS is exposed to external threats primarily because of the use of commercial off-the-shelf (COTS) and is highly linked to the network for various reasons (ie businesses offering remote access to employees). Internal threats occur mainly due to wrong actions. For example, the RISI database indicates that employees accidentally uploaded the program into the PLC directly and caused a half-day production loss for not communicating well with engineering consultants completing actual tests and employees.
The main of the control system are inadequate policies / procedures, no in-depth defense design, inadequate remote access control, improper software maintenance, inadequate wireless communications to control, use of broadband control for control purposes, failure to view unsuitable activity in the system, the control network data is invalid and insufficient to support critical components and systems.
Firewalls can help disrupt the threats to the system. Installing firewalls is easy, programming is difficult, and proper programming is very difficult. Incorrect firewall is configured the same as not having one.
Feel free to contact E-SPIN for the solution for your system and operation to reduce risk of your businesses and organization. We can secure and protect your businesses with our various software security technology, include SCADA, ICS, DCS security.