Submit Search
Upload
Hazardex 2018 when safety met security
•
Download as PPTX, PDF
•
0 likes
•
524 views
R
Rob Turner
Follow
A copy of the presentation set used at Hazardex 2018 in Runcorn, UK.
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 27
Download now
Recommended
Iec61508 guide
Iec61508 guide
ronnyalex2013
Standards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
Efficient security to meet modern day challenges
Efficient security to meet modern day challenges
Schneider Electric
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
Andy Bochman
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
sidhota
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
Recommended
Iec61508 guide
Iec61508 guide
ronnyalex2013
Standards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
Efficient security to meet modern day challenges
Efficient security to meet modern day challenges
Schneider Electric
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
SGSB Webcast 4: Smart Grid Security Standards in Mid 2010
Andy Bochman
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
sidhota
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
Cyber security of power grid
Cyber security of power grid
P K Agarwal
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
Nozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
Narinrit Prem-apiwathanokul
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network Security
IRJET Journal
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Sean R. Bouchard, P.Eng
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
Yokogawa1
Securing Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy Sector
Smart Grid Interoperability Panel
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Power System Operation
Encryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
Joan Figueras Tugas
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET Journal
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
IRJET Journal
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians 2015 july
Michael Mattocks
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Michael Mattocks
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
Dr Dev Kambhampati
More Related Content
What's hot
Cyber security of power grid
Cyber security of power grid
P K Agarwal
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
Nozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
Narinrit Prem-apiwathanokul
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network Security
IRJET Journal
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Sean R. Bouchard, P.Eng
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
Yokogawa1
Securing Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy Sector
Smart Grid Interoperability Panel
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Power System Operation
Encryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
ClubHack
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Leonardo ENERGY
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
Joan Figueras Tugas
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET Journal
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
IRJET Journal
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
What's hot
(19)
Cyber security of power grid
Cyber security of power grid
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi networks-solution brief
Nozomi networks-solution brief
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network Security
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Introduction to Industrial Cybersecurity for Water and Waste Water Operators
Contributing to the Development and Application of Cybersecurity Standards
Contributing to the Development and Application of Cybersecurity Standards
Securing Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy Sector
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Encryption Security in SCADA Networks
Encryption Security in SCADA Networks
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
IRJET- Measuring Electricity Consumption of Appliances and Monitoring the...
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
Similar to Hazardex 2018 when safety met security
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians 2015 july
Michael Mattocks
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Michael Mattocks
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
Dr Dev Kambhampati
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Schneider Electric
ISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_Final
Andy Nack
Smart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers Safety
IRJET Journal
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptx
Masoud Hayeri Khyavi
IRJET - Intelligent Helmet for Coal Mine Workers
IRJET - Intelligent Helmet for Coal Mine Workers
IRJET Journal
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Yokogawa1
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Hamilton
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
A. V. Rajabahadur
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
IDES Editor
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
IRJET Journal
Induction Motor Protection Using PLC
Induction Motor Protection Using PLC
vivatechijri
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET Journal
Irjet v7 i3475
Irjet v7 i3475
aissmsblogs
Afa wea
Afa wea
Alaa Eladl
10. industrial networks safety and security tom hammond
10. industrial networks safety and security tom hammond
PROFIBUS and PROFINET InternationaI - PI UK
Similar to Hazardex 2018 when safety met security
(20)
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the certification of wind turbine service technicians 2015 july
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
Guideline for the Chartered Certification WTSR of Wind Turbine Service Techni...
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
ISApaperIEC61508_AMN_Final
ISApaperIEC61508_AMN_Final
Smart Helmet for Industrial Workers Safety
Smart Helmet for Industrial Workers Safety
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptx
IRJET - Intelligent Helmet for Coal Mine Workers
IRJET - Intelligent Helmet for Coal Mine Workers
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
Induction Motor Protection Using PLC
Induction Motor Protection Using PLC
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Irjet v7 i3475
Irjet v7 i3475
Afa wea
Afa wea
10. industrial networks safety and security tom hammond
10. industrial networks safety and security tom hammond
Recently uploaded
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Hazardex 2018 when safety met security
1.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation HazardEx 2018 When Safety met Security - Combining the best of both worlds 1 Rob Turner Advanced Solutions Consultant Yokogawa UK Ltd
2.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation When safety met security 2 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
3.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Yokogawa Europe (The Netherlands) Yokogawa Corporation of America (USA) Yokogawa Middle East & Africa (Bahrain) Yokogawa Electric International Yokogawa Engineering Asia (Singapore) Yokogawa Electric CIS (Russia) Yokogawa America do Sul (Brazil) Yokogawa Electric Korea (Korea) World Headquarters Yokogawa Electric Corporation (Japan)Yokogawa China (China) A quick bit about Yokogawa 3 4,000 project engineers 2,000 service engineers solution consultants & software engineers 44,000 projects worldwide 19,000 employees 101 affiliates in 59 countries $3.45B in sales / $252M net income 1,200 As of January 2017 KBC Advanced Technologies Limited
4.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation When safety met security 4 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
5.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 5 What is different about a control system? (compared with an IT system) Kinetic energy! Age of the hardware and software The network protocols in use, eg Modbus, Ethernet/IP, OPC Access for patching, AV updates, etc The use of wireless communications for command & control These systems are often responsible for control of a physical process
6.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 6 And what is different about a safety instrumented system (SIS)? Engineered to be as reliable as possible in terms of integrity and availability Or to put it another way, “How do I know this system will work when I need it to?” (The answer is addressed by IEC 61511) This is how it is designed to work, but what if somebody has other intentions?
7.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Technology considerations 7 Abstract: This paper demonstrates attack induced common-mode failures on an industrial-grade (Xxxx) Triple-Modular-Redundant PLC (programmable logic controller) and its impact in a Nuclear Power Plant settings. The attack exploits the fact that during the configuration phase the same control logic is downloaded to all three redundant modules. We describe how an attacker can exploit this vulnerability to embed malicious control logic and how to trigger the attack. The feasibility and the attack impact are evaluated on a testbed, which includes the Xxxx PLC as part of a safety protection system in a simulated nuclear power plant. For example, a recently published exploit…
8.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Regulatory drivers OG-0086 “Cyber Security for Industrial Automation and Control Systems (IACS)” Aimed at MAH sites both onshore and offshore Cites IEC 61511 as “Recognised Good Practice” Cites IEC 62443 under Other Relevant Standards To be used by EC&I Specialist Inspectors during interventions at major hazard workplaces from 2018 onwards Will also apply retrospectively to existing systems Available at http://www.hse.gov.uk/foi/internalops/og/og-0086.pdf. 8 UK HSE guidance on industrial cyber security
9.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Regulatory drivers 9 The NIS Directive requires that Member States ensure designated Operators of Essential Services: Take “appropriate and proportionate technical and organisational measures to manage the risks posed to the security of network and information systems in the provision of their service”. Take “appropriate measures to prevent and minimise the impact of the incidents affecting the security of the network and information systems used in the provision of their service”. Notify their relevant competent authority or CSIRT of incidents having a significant impact on the continuity of the essential services they provide. The high level principles will be set by the National Cyber Security Centre These principles describe the mandatory security outcomes that all operators will be required to achieve. “Member States are required to lay down the rules on penalties applicable to infringements of this Directive and must take all measures necessary to ensure that they are implemented. Any penalties provided for in national legislation should be effective, proportionate and dissuasive”. The Network and Information Systems Directive (NIS Directive)
10.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation When safety met security 10 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
11.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation The standard for functional safety has changed 11 New section 8.2.4: “A security risk assessment shall be carried out to identify the security vulnerabilities of the SIS.” New section 11.2.12: “The design of the SIS shall be such that it provides the necessary resilience against the identified security risks (see 8.2.4)”. IEC 61511 “Functional safety - Safety instrumented systems for the process industry sector” Edition 2, 2016
12.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation So there are two applicable standards? 12 IEC 61511-1:2016 “Safety Instrumented Systems for the Process Industry Sector” IEC 62443-1-1:2009 “Industrial Communication Networks – Network and System Security” Why IEC 61511? At first sight this might appear to be an additional burden for the process industries and an intrusion into the jurisdiction of IEC 62443 which already covers the security of these systems.
13.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Layers of Protection and IEC 61511 13
14.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Cyber “Layers of Defence” and IEC 62443 14 Defence in Depth • End point measures • Physical measures • Network measures Detection in Depth • Technology measures • Organisational measures “Response in Depth” • Security policy • Procedures (eg for backup / recovery) • Disaster recovery planning • Business continuity planning • Etc.
15.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Protective measures 15 Functional Safety Industrial Cyber Security “Layers of protection” “Layers of defence”
16.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Risk assessment 16 IEC 61511 SIL Target SIL Achieved SIL IEC 62443 SAL Target SAL Achieved SAL IEC 61511: SIL = Safety Integrity Level (0 – 4) Refers to the safety function that includes the SIS IEC 62443: SAL or SL = Security Assurance Level (0 – 4) Usually refers to the zone under consideration (ZuC) Both employ the concept of a risk matrix. Functional Safety Industrial Cyber Security
17.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Tolerable risk 17 Safety Security Determined by society and / or Regulators (ALARP) Determined by the business (Regulators in the near future?)
18.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation When safety met security 18 1. Why do we need a tie between safety and security for industrial control systems? 2. What are the areas of common ground between IEC 61511 and IEC 62443? 3. How could we combine the two?
19.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 19 It probably depends on where you start from – functional safety or industrial cyber security? Consider security aspects in safety risk assessments? This is the IEC 61511 approach, and the approach taken by the UK’s HSE. Consider safety aspects in security risk assessments? This is certainly applicable to security in the OT domain! Is there value in carrying out a combined safety and security improvement program?
20.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 20 Safety Security 1) Break the elephant up into bite-size chunks 2) Carry out a risk assessment on each chunk 3) Close the gap between achieved risk and target risk for each chunk.
21.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 21 Safety Security Object Under Consideration “Safety function” “Zone under Consideration”
22.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 22 Safety Security Qualitative Risk Assessment Risk matrix Risk matrix Target Achieved SIL, EIL, CIL Target – SLT or SALT Achieved – SLA or SALA Also covers the equivalent of EIL, CIL gap
23.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation How could we combine the two? 23 Safety Security Closing the gap Risk Reduction Factors Independent Protection Layers (IPL) Risk Reduction Factors Independent Defence Layers (IDL)
24.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Summary 24 OT security and IT security are not the same In the Process Control Domain there is a significant overlap between cyber security and functional safety. They are two sides of the same coin The regulatory framework in the UK and Europe is starting to catch up • UK HSE’s Operational Guidance note • European Union’s NIS Directive There are similarities in the management frameworks for industrial cyber security (IEC 62443) and functional safety in the process industries (IEC 61511) Is there a case for combining the two when assessing and mitigating risk?
25.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Some remaining questions 25 1) We have LOPA for functional safety, what does LODA (Layer of Defense Analysis) look like? 2) How do we know when we have reached ALARP for security measures? 3) And will we see TÜV Certified Functional Security Engineers in the future?
26.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation Thank you! 26 Rob Turner BSc (Hons) CEng MIET GICSP Advanced Solutions Consultant Yokogawa UK Ltd 33 Abercrombie Court Arnhall Business Park Westhill, Aberdeen AB32 6FE t: +44 (0)7810 518224 e: rob.turner@uk.yokogawa.com w: www.yokogawa.com/uk Global Industrial Cyber Security Professional Analyst #1160 With thanks to the owners of all images used – all rights acknowledged
27.
| Document Number
| March 23, 2016 | © Yokogawa Electric Corporation 27
Download now