SlideShare a Scribd company logo
1 of 27
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
HazardEx 2018
When Safety met Security -
Combining the best of both
worlds
1
Rob Turner
Advanced Solutions Consultant
Yokogawa UK Ltd
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
When safety met security
2
1. Why do we need a tie between
safety and security for industrial
control systems?
2. What are the areas of common
ground between IEC 61511 and
IEC 62443?
3. How could we combine the two?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Yokogawa Europe
(The Netherlands) Yokogawa Corporation of America
(USA)
Yokogawa
Middle East & Africa
(Bahrain)
Yokogawa Electric International
Yokogawa Engineering Asia
(Singapore)
Yokogawa Electric CIS
(Russia)
Yokogawa America
do Sul (Brazil)
Yokogawa Electric Korea
(Korea)
World Headquarters
Yokogawa Electric Corporation
(Japan)Yokogawa China
(China)
A quick bit about Yokogawa
3
4,000 project engineers 2,000 service engineers
solution consultants
& software engineers 44,000 projects worldwide
19,000
employees
101 affiliates in
59 countries
$3.45B in sales /
$252M net income
1,200
As of January 2017
KBC
Advanced Technologies
Limited
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
When safety met security
4
1. Why do we need a tie between
safety and security for industrial
control systems?
2. What are the areas of common
ground between IEC 61511 and
IEC 62443?
3. How could we combine the two?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Technology considerations
5
What is different about a control system? (compared with an IT system)
Kinetic
energy!
Age of the
hardware and
software
The network
protocols in
use, eg
Modbus,
Ethernet/IP,
OPC
Access for
patching, AV
updates, etc
The use of
wireless
communications
for command &
control
These systems
are often
responsible for
control of a
physical
process
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Technology considerations
6
And what is different about a safety instrumented system (SIS)?
Engineered to be as reliable as possible in terms of
integrity and availability
Or to put it another way, “How do I know this system
will work when I need it to?”
(The answer is addressed by IEC 61511)
This is how it is designed to work, but what if somebody
has other intentions?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Technology considerations
7
Abstract:
This paper demonstrates attack induced common-mode failures
on an industrial-grade (Xxxx) Triple-Modular-Redundant PLC
(programmable logic controller) and its impact in a Nuclear Power
Plant settings. The attack exploits the fact that during the
configuration phase the same control logic is downloaded to all
three redundant modules. We describe how an attacker can
exploit this vulnerability to embed malicious control logic and how
to trigger the attack. The feasibility and the attack impact are
evaluated on a testbed, which includes the Xxxx PLC as part of a
safety protection system in a simulated nuclear power plant.
For example, a recently published exploit…
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Regulatory drivers
 OG-0086 “Cyber Security for Industrial Automation and Control
Systems (IACS)”
 Aimed at MAH sites both onshore and offshore
 Cites IEC 61511 as “Recognised Good Practice”
 Cites IEC 62443 under Other Relevant Standards
 To be used by EC&I Specialist Inspectors during interventions at
major hazard workplaces from 2018 onwards
 Will also apply retrospectively to existing systems
 Available at http://www.hse.gov.uk/foi/internalops/og/og-0086.pdf.
8
UK HSE guidance on industrial cyber security
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Regulatory drivers
9
The NIS Directive
requires that
Member States
ensure designated
Operators of
Essential
Services:
Take “appropriate and proportionate technical and organisational measures to manage the
risks posed to the security of network and information systems in the provision of their
service”.
Take “appropriate measures to prevent and minimise the impact of the incidents affecting
the security of the network and information systems used in the provision of their service”.
Notify their relevant competent authority or CSIRT of incidents having a significant impact on
the continuity of the essential services they provide.
The high level
principles will be
set by the National
Cyber Security
Centre
These principles describe the mandatory security outcomes that all operators will be
required to achieve.
“Member States are required to lay down the rules on penalties applicable to infringements of this
Directive and must take all measures necessary to ensure that they are implemented. Any penalties
provided for in national legislation should be effective, proportionate and dissuasive”.
The Network and Information Systems Directive (NIS Directive)
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
When safety met security
10
1. Why do we need a tie between
safety and security for industrial
control systems?
2. What are the areas of common
ground between IEC 61511 and
IEC 62443?
3. How could we combine the two?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
The standard for functional safety has changed
11
New section 8.2.4:
“A security risk assessment shall be carried out to identify the
security vulnerabilities of the SIS.”
New section 11.2.12:
“The design of the SIS shall be such that it provides the
necessary resilience against the identified security risks (see
8.2.4)”.
IEC 61511 “Functional safety - Safety instrumented systems for the
process industry sector” Edition 2, 2016
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
So there are two applicable standards?
12
IEC 61511-1:2016
“Safety Instrumented Systems for
the Process Industry Sector”
IEC 62443-1-1:2009
“Industrial Communication Networks –
Network and System Security”
Why IEC 61511? At first sight this might appear to be an additional burden
for the process industries and an intrusion into the jurisdiction of IEC 62443
which already covers the security of these systems.
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Layers of Protection and IEC 61511
13
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Cyber “Layers of Defence” and IEC 62443
14
Defence in Depth
• End point measures
• Physical measures
• Network measures
Detection in Depth
• Technology measures
• Organisational measures
“Response in Depth”
• Security policy
• Procedures (eg for backup / recovery)
• Disaster recovery planning
• Business continuity planning
• Etc.
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Protective measures
15
Functional Safety Industrial Cyber Security
“Layers of protection” “Layers of defence”
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Risk assessment
16
IEC 61511
SIL
Target SIL Achieved SIL
IEC 62443
SAL
Target SAL Achieved SAL
IEC 61511: SIL = Safety Integrity Level (0 – 4) Refers to the safety
function that includes the SIS
IEC 62443: SAL or SL = Security Assurance Level (0 – 4) Usually
refers to the zone under consideration (ZuC)
Both employ the concept of a risk matrix.
Functional Safety Industrial Cyber Security
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Tolerable risk
17
Safety Security
Determined by society and /
or Regulators
(ALARP)
Determined by the business
(Regulators in the near future?)
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
When safety met security
18
1. Why do we need a tie between
safety and security for industrial
control systems?
2. What are the areas of common
ground between IEC 61511 and
IEC 62443?
3. How could we combine the two?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
How could we combine the two?
19
It probably depends on where you start from –
functional safety or industrial cyber security?
Consider security aspects in safety risk assessments? This is
the IEC 61511 approach, and the approach taken by the UK’s
HSE.
Consider safety aspects in security risk assessments? This is
certainly applicable to security in the OT domain!
Is there value in carrying out a combined safety and security
improvement program?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
How could we combine the two?
20
Safety Security
1) Break the elephant up into bite-size chunks
2) Carry out a risk assessment on each chunk
3) Close the gap between achieved risk and
target risk for each chunk.
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
How could we combine the two?
21
Safety Security
Object Under
Consideration
“Safety function”
“Zone under Consideration”
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
How could we combine the two?
22
Safety Security
Qualitative Risk
Assessment
Risk matrix Risk matrix
Target
Achieved
SIL, EIL, CIL
Target – SLT or SALT
Achieved – SLA or SALA
Also covers the equivalent
of EIL, CIL
gap
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
How could we combine the two?
23
Safety Security
Closing the gap
Risk Reduction Factors
Independent Protection
Layers (IPL)
Risk Reduction Factors
Independent Defence
Layers (IDL)
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Summary
24
OT security and IT security are not the same
In the Process Control Domain there is a significant overlap between cyber
security and functional safety. They are two sides of the same coin
The regulatory framework in the UK and Europe is starting to catch up
• UK HSE’s Operational Guidance note
• European Union’s NIS Directive
There are similarities in the management frameworks for industrial cyber security
(IEC 62443) and functional safety in the process industries (IEC 61511)
Is there a case for combining the two when assessing and mitigating risk?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Some remaining questions
25
1) We have LOPA for functional safety, what does LODA (Layer of Defense
Analysis) look like?
2) How do we know when we have reached ALARP for security measures?
3) And will we see TÜV Certified Functional Security Engineers in the future?
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
Thank you!
26
Rob Turner BSc (Hons) CEng MIET GICSP
Advanced Solutions Consultant
Yokogawa UK Ltd
33 Abercrombie Court
Arnhall Business Park
Westhill, Aberdeen
AB32 6FE
t: +44 (0)7810 518224
e: rob.turner@uk.yokogawa.com
w: www.yokogawa.com/uk
Global Industrial Cyber
Security Professional
Analyst #1160
With thanks to the owners of all images used – all rights acknowledged
| Document Number | March 23, 2016 |
© Yokogawa Electric Corporation
27

More Related Content

What's hot

Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power gridP K Agarwal
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network SecurityA Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network SecurityIRJET Journal
 
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water OperatorsIntroduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water OperatorsSean R. Bouchard, P.Eng
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsYokogawa1
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Power System Operation
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA NetworksIJRES Journal
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET-  	  Measuring Electricity Consumption of Appliances and Monitoring the...IRJET-  	  Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...IRJET Journal
 
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction MotorZigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction MotorIRJET Journal
 

What's hot (19)

Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network SecurityA Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network Security
 
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water OperatorsIntroduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
 
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity StandardsContributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
 
Securing Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy SectorSecuring Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy Sector
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET-  	  Measuring Electricity Consumption of Appliances and Monitoring the...IRJET-  	  Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
 
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction MotorZigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 

Similar to Hazardex 2018 when safety met security

Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians  2015 julyGuideline for the certification of wind turbine service technicians  2015 july
Guideline for the certification of wind turbine service technicians 2015 julyMichael Mattocks
 
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Michael Mattocks
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Schneider Electric
 
ISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_FinalISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_FinalAndy Nack
 
Smart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers SafetySmart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers SafetyIRJET Journal
 
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptxConceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptxMasoud Hayeri Khyavi
 
IRJET - Intelligent Helmet for Coal Mine Workers
IRJET -  	  Intelligent Helmet for Coal Mine WorkersIRJET -  	  Intelligent Helmet for Coal Mine Workers
IRJET - Intelligent Helmet for Coal Mine WorkersIRJET Journal
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Cybersecurity Application Installation with no Shutdown Required webinar  SlidesCybersecurity Application Installation with no Shutdown Required webinar  Slides
Cybersecurity Application Installation with no Shutdown Required webinar SlidesYokogawa1
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
 
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTSMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTIRJET Journal
 
Induction Motor Protection Using PLC
Induction Motor Protection Using PLCInduction Motor Protection Using PLC
Induction Motor Protection Using PLCvivatechijri
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 

Similar to Hazardex 2018 when safety met security (20)

Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians  2015 julyGuideline for the certification of wind turbine service technicians  2015 july
Guideline for the certification of wind turbine service technicians 2015 july
 
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
 
ISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_FinalISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_Final
 
Smart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers SafetySmart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers Safety
 
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptxConceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptx
 
IRJET - Intelligent Helmet for Coal Mine Workers
IRJET -  	  Intelligent Helmet for Coal Mine WorkersIRJET -  	  Intelligent Helmet for Coal Mine Workers
IRJET - Intelligent Helmet for Coal Mine Workers
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Cybersecurity Application Installation with no Shutdown Required webinar  SlidesCybersecurity Application Installation with no Shutdown Required webinar  Slides
Cybersecurity Application Installation with no Shutdown Required webinar Slides
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
 
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTSMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
 
Induction Motor Protection Using PLC
Induction Motor Protection Using PLCInduction Motor Protection Using PLC
Induction Motor Protection Using PLC
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
Afa wea
Afa weaAfa wea
Afa wea
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Hazardex 2018 when safety met security

  • 1. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation HazardEx 2018 When Safety met Security - Combining the best of both worlds 1 Rob Turner Advanced Solutions Consultant Yokogawa UK Ltd
  • 2. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation When safety met security 2 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
  • 3. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Yokogawa Europe (The Netherlands) Yokogawa Corporation of America (USA) Yokogawa Middle East & Africa (Bahrain) Yokogawa Electric International Yokogawa Engineering Asia (Singapore) Yokogawa Electric CIS (Russia) Yokogawa America do Sul (Brazil) Yokogawa Electric Korea (Korea) World Headquarters Yokogawa Electric Corporation (Japan)Yokogawa China (China) A quick bit about Yokogawa 3 4,000 project engineers 2,000 service engineers solution consultants & software engineers 44,000 projects worldwide 19,000 employees 101 affiliates in 59 countries $3.45B in sales / $252M net income 1,200 As of January 2017 KBC Advanced Technologies Limited
  • 4. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation When safety met security 4 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
  • 5. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 5 What is different about a control system? (compared with an IT system) Kinetic energy! Age of the hardware and software The network protocols in use, eg Modbus, Ethernet/IP, OPC Access for patching, AV updates, etc The use of wireless communications for command & control These systems are often responsible for control of a physical process
  • 6. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 6 And what is different about a safety instrumented system (SIS)? Engineered to be as reliable as possible in terms of integrity and availability Or to put it another way, “How do I know this system will work when I need it to?” (The answer is addressed by IEC 61511) This is how it is designed to work, but what if somebody has other intentions?
  • 7. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 7 Abstract: This paper demonstrates attack induced common-mode failures on an industrial-grade (Xxxx) Triple-Modular-Redundant PLC (programmable logic controller) and its impact in a Nuclear Power Plant settings. The attack exploits the fact that during the configuration phase the same control logic is downloaded to all three redundant modules. We describe how an attacker can exploit this vulnerability to embed malicious control logic and how to trigger the attack. The feasibility and the attack impact are evaluated on a testbed, which includes the Xxxx PLC as part of a safety protection system in a simulated nuclear power plant. For example, a recently published exploit…
  • 8. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Regulatory drivers  OG-0086 “Cyber Security for Industrial Automation and Control Systems (IACS)”  Aimed at MAH sites both onshore and offshore  Cites IEC 61511 as “Recognised Good Practice”  Cites IEC 62443 under Other Relevant Standards  To be used by EC&I Specialist Inspectors during interventions at major hazard workplaces from 2018 onwards  Will also apply retrospectively to existing systems  Available at http://www.hse.gov.uk/foi/internalops/og/og-0086.pdf. 8 UK HSE guidance on industrial cyber security
  • 9. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Regulatory drivers 9 The NIS Directive requires that Member States ensure designated Operators of Essential Services: Take “appropriate and proportionate technical and organisational measures to manage the risks posed to the security of network and information systems in the provision of their service”. Take “appropriate measures to prevent and minimise the impact of the incidents affecting the security of the network and information systems used in the provision of their service”. Notify their relevant competent authority or CSIRT of incidents having a significant impact on the continuity of the essential services they provide. The high level principles will be set by the National Cyber Security Centre These principles describe the mandatory security outcomes that all operators will be required to achieve. “Member States are required to lay down the rules on penalties applicable to infringements of this Directive and must take all measures necessary to ensure that they are implemented. Any penalties provided for in national legislation should be effective, proportionate and dissuasive”. The Network and Information Systems Directive (NIS Directive)
  • 10. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation When safety met security 10 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
  • 11. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation The standard for functional safety has changed 11 New section 8.2.4: “A security risk assessment shall be carried out to identify the security vulnerabilities of the SIS.” New section 11.2.12: “The design of the SIS shall be such that it provides the necessary resilience against the identified security risks (see 8.2.4)”. IEC 61511 “Functional safety - Safety instrumented systems for the process industry sector” Edition 2, 2016
  • 12. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation So there are two applicable standards? 12 IEC 61511-1:2016 “Safety Instrumented Systems for the Process Industry Sector” IEC 62443-1-1:2009 “Industrial Communication Networks – Network and System Security” Why IEC 61511? At first sight this might appear to be an additional burden for the process industries and an intrusion into the jurisdiction of IEC 62443 which already covers the security of these systems.
  • 13. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Layers of Protection and IEC 61511 13
  • 14. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Cyber “Layers of Defence” and IEC 62443 14 Defence in Depth • End point measures • Physical measures • Network measures Detection in Depth • Technology measures • Organisational measures “Response in Depth” • Security policy • Procedures (eg for backup / recovery) • Disaster recovery planning • Business continuity planning • Etc.
  • 15. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Protective measures 15 Functional Safety Industrial Cyber Security “Layers of protection” “Layers of defence”
  • 16. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Risk assessment 16 IEC 61511 SIL Target SIL Achieved SIL IEC 62443 SAL Target SAL Achieved SAL IEC 61511: SIL = Safety Integrity Level (0 – 4) Refers to the safety function that includes the SIS IEC 62443: SAL or SL = Security Assurance Level (0 – 4) Usually refers to the zone under consideration (ZuC) Both employ the concept of a risk matrix. Functional Safety Industrial Cyber Security
  • 17. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Tolerable risk 17 Safety Security Determined by society and / or Regulators (ALARP) Determined by the business (Regulators in the near future?)
  • 18. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation When safety met security 18 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
  • 19. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 19 It probably depends on where you start from – functional safety or industrial cyber security? Consider security aspects in safety risk assessments? This is the IEC 61511 approach, and the approach taken by the UK’s HSE. Consider safety aspects in security risk assessments? This is certainly applicable to security in the OT domain! Is there value in carrying out a combined safety and security improvement program?
  • 20. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 20 Safety Security 1) Break the elephant up into bite-size chunks 2) Carry out a risk assessment on each chunk 3) Close the gap between achieved risk and target risk for each chunk.
  • 21. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 21 Safety Security Object Under Consideration “Safety function” “Zone under Consideration”
  • 22. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 22 Safety Security Qualitative Risk Assessment Risk matrix Risk matrix Target Achieved SIL, EIL, CIL Target – SLT or SALT Achieved – SLA or SALA Also covers the equivalent of EIL, CIL gap
  • 23. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 23 Safety Security Closing the gap Risk Reduction Factors Independent Protection Layers (IPL) Risk Reduction Factors Independent Defence Layers (IDL)
  • 24. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Summary 24 OT security and IT security are not the same In the Process Control Domain there is a significant overlap between cyber security and functional safety. They are two sides of the same coin The regulatory framework in the UK and Europe is starting to catch up • UK HSE’s Operational Guidance note • European Union’s NIS Directive There are similarities in the management frameworks for industrial cyber security (IEC 62443) and functional safety in the process industries (IEC 61511) Is there a case for combining the two when assessing and mitigating risk?
  • 25. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Some remaining questions 25 1) We have LOPA for functional safety, what does LODA (Layer of Defense Analysis) look like? 2) How do we know when we have reached ALARP for security measures? 3) And will we see TÜV Certified Functional Security Engineers in the future?
  • 26. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation Thank you! 26 Rob Turner BSc (Hons) CEng MIET GICSP Advanced Solutions Consultant Yokogawa UK Ltd 33 Abercrombie Court Arnhall Business Park Westhill, Aberdeen AB32 6FE t: +44 (0)7810 518224 e: rob.turner@uk.yokogawa.com w: www.yokogawa.com/uk Global Industrial Cyber Security Professional Analyst #1160 With thanks to the owners of all images used – all rights acknowledged
  • 27. | Document Number | March 23, 2016 | © Yokogawa Electric Corporation 27