Cyber security standard aims at critical infrastructure in process industries

The International Instrument Users Association (WIB) releases comprehensive cyber security standard to protect critical industrial computer systems from cyber attack.

11/16/2010


The International Instrument Users Association (WIB), an international organization that represents global manufacturers in the industrial automation industry, announced the second version of the Process Control Domain Security Requirements For Vendors document – the first international standard that outlines a set of specific requirements focusing on cyber security best practices for suppliers of industrial automation and control systems.

“We are pleased to announce today the second version of our cyber security standard,” said Alex van Delft, competence manager for process control at DSM and chairman of the WIB. “This is an important step in the ongoing process to improve the reliability of our critical manufacturing and production systems, and provides end-users the ability to communicate their expectations about the security of process automation, control, and safety systems.”

With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems. Whether it is a targeted attack like Stuxnet, or an accidental disruption, a single cyber incident can cost millions of dollars in lost revenue, jeopardize employee and public safety, and potentially disrupt national critical infrastructure.

“Our increasingly connected production systems are facing a growing threat on a daily basis and we must do all we can to ensure a safe and secure operational environment,” said Peter Kwaspen, strategy and development manager, EMEA control and automation systems at Shell Projects & Technology. “This document provides the common language we need to communicate our expectations around security to our suppliers and the framework to work together to help improve the overall security posture for our critical systems.”

Led by major companies such as Shell, BP, Saudi Aramco, Dow, DuPont, Laborelec, Wintershall, and dozens of other end-users, as well as leading vendors such as Invensys, Sensus, and multiple government agencies, the group spent two years developing the requirements and piloting a certification program to ensure a functional, scalable, and ultimately valuable result.

“The security requirements outlined in the document went through a year of comments and revisions from over 50 global stakeholders and were subjected to a thorough pilot certification program over the last eight months,” said Jos Menting, cyber security advisor GDF Suez Group. “We’ve now come to a truly functional cyber security standard based on the needs of end-users and it is now up to us, the end-users, to take advantage of this effort and insist that our vendors are certified.”

Members of the WIB Plant Security Working Group have already started implementing the requirements into their procurement processes and others around the world are heeding the call. “Shell has mandated conformance to the WIB standard for all vendors supplying systems to be deployed in Shell’s process control environment starting January 1, 2011,” said Ted Angevaare, PACO EMEA control and automation systems team leader. “These requirements will become a standard part of the procurement language saving us a significant amount of time and effort.”

Leading suppliers of industrial process control and automation systems are also starting the process of integrating the requirements into their organizations. “Adopting the WIB’s security requirements ensures that Invensys has a set of measurable practices in place that enforce a safer and more secure critical infrastructure. Not only do the requirements provide current-state measures, they allow us to continue to improve and adapt to the ever-changing security landscape,” said Ernie Rakaczky, program manager for control systems cyber security at Invensys Operations Management. “From our perspective, this program is a major shift, not only focusing on tactics, but one that puts into place strategic elements that address operational change.”

Cyber security at all stages of the industrial product lifecycle

The WIB standard is designed to fit the needs of end-users – the system owner/operators – and reflects the unique requirements for industries like oil and gas, electric power, smart grid, transportation, pharmaceutical, and chemical. The goal is to address cyber security best practices and allocate responsibility at various stages of the industrial system lifecycle: Organizational practices, product development, testing, commissioning, maintenance, and support.

“Security is not a one-time application, but rather a process in which every stakeholder must contribute in order to achieve any significant improvement in operational reliability,” said Auke Huistra, project manager at National Infrastructure against Cyber Crime (NICC). “The WIB requirements are designed with this principle at its core and we are encouraging critical infrastructure stakeholders in The Netherlands to integrate the requirements into their cyber security plans.”

The requirements were also constructed to address a broad range of cyber security topics relevant to industrial stakeholders; from high-level requirements for vendor’s internal security policies, procedures, and governance, to specific requirements concerning access, authentication, data protection, default password protection, and patch management. When a vendor’s solution complies with this set of requirements, the solution is considered by the WIB to be Process Control Domain Security Compatible.

The requirements are further broken down into 3 levels designed to reflect various starting points of global suppliers and provide a scalable framework to plan improvements over time. In the program, there are Gold, Silver and Bronze levels, each consisting of a set requirements designed to verify that applicable policies and practices are in place, enabled and practiced by the vendor.

Successful global cooperation

From the beginning, industry leaders recognized that given the global nature of industrial cyber security, any effort to standardize cyber security best practices would require stakeholder cooperation from different industry sectors and in different regions of the world. The WIB association was the ideal conduit to guide creation of the standard given its independent nature and membership composition. Moreover, the initiative needed to reflect and incorporate the important cyber security activities happening internationally. Many government agencies, industry working groups, and standards bodies were consulted to ensure harmony. For example, major industry standards efforts such as ISA SP99, NIST 800-53, NISTIR 7628, and various international government regulations such as NERC/CIP were reviewed and incorporated where appropriate or expanded to ensure testability. The WIB executive committee has started the process of introducing the WIB PCD requirements into the CEN/CENELEC and IEC international standards framework.

Download a copy of the standard.

www.wib.nl

www.wib.nl/download.html

www.isssource.com/wib

Edited by Peter Welander, pwelander(at)cfemedia.com

Visit the Control Engineering Plant Safety & Security Channel.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Go deep: Automation tackles offshore oil challenges; Ethernet advice; Wireless robotics; Product exclusives; Digital edition exclusives
Lost in the gray scale? How to get effective HMIs; Best practices: Integrate old and new wireless systems; Smart software, networks; Service provider certifications
Fixing PID: Part 2: Tweaking controller strategy; Machine safety networks; Salary survey and career advice; Smart I/O architecture; Product exclusives
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Look at the basics of industrial wireless technologies, wireless concepts, wireless standards, and wireless best practices with Daniel E. Capano of Diversified Technical Services Inc.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.