Cybersecurity needs to go beyond basic security methods

Basic cybersecurity methods, while useful, are only a temporary solution to a larger and growing problem. A successful cybersecurity program goes beyond the basic solutions and provides a comprehensive approach.


Cybersecurity continues to be a focus of concern for manufacturing and industrial systems. It is critical to find solutions for protecting the plant floor. The threat landscape continues to evolve. Attacks are becoming more focused and more sophisticated and unfortunately, more successful.

Determining the appropriate response is a critical challenge for plant operators. One resource available to operators is provided in the Department of Homeland Security report, "Seven Strategies to Defend ICSs" issued in December 2015 by the National Cybersecurity and Communications Integration Center (NCCIC).

In Fiscal Year 2015, 295 incidents were reported to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), and many more went unreported or undetected. The department recommends seven strategies that would have addressed all the breaches and would have protected the safety and reliability of the affected industrial operations.

This white paper shows that basic security techniques actually work. If the seven basic strategies they outlined had been widely applied, the reported attacks would have been blocked.

But implementing only basic security can lead to a false sense of overall security. Why? Because the basic attacks were successful, so hackers did not have to use more advanced techniques. For instance, if you park your car in a bad neighborhood and leave the door unlocked with a big pile of cash in the back seat, someone will likely open the door and steal your money. Saying that you could have stopped the theft by locking your doors is clearly ridiculous. Someone could smash your window, pick the lock, or show up with a tow truck and steal the entire car.

Even if the basic security measures had been in place, that does not guarantee that hackers would have given up and gone home. They would have dug deeper into their bag of tricks and tried something else. Would they have still gotten in? In many cases, the answer is yes, which is why we need to implement more advanced security capabilities.

Approaches outlined in this report are effective and should not be abandoned or ignored. They provide a strong foundation for security and we must start with the basics. But we can't stop with these basic solutions.

Comprehensive cybersecurity management programs must also address advanced persistent threats (APTs), ransomware, and other evolving threats. They must include an overall security architecture, along with the policies and training we provide to the people using our systems. Only by addressing the entire system can we achieve security. 

Alan Grau is president and CEO of Icon Labs and is a member of MESA International's cybersecurity working group. This article originally appeared on MESA International's blog. MESA International is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media,

ONLINE extra

See additional stories about cybersecurity linked below.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Additive manufacturing benefits; HMI and sensor tips; System integrator advice; Innovations from the industry
Robotic safety, collaboration, standards; DCS migration tips; IT/OT convergence; 2017 Control Engineering Salary and Career Survey
Integrated mobility; Artificial intelligence; Predictive motion control; Sensors and control system inputs; Asset Management; Cybersecurity
Featured articles highlight technologies that enable the Industrial Internet of Things, IIoT-related products and strategies to get data more easily to the user.
This article collection contains several articles on how automation and controls are helping human-machine interface (HMI) hardware and software advance.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Infrastructure for natural gas expansion; Artificial lift methods; Disruptive technology and fugitive gas emissions
Mobility as the means to offshore innovation; Preventing another Deepwater Horizon; ROVs as subsea robots; SCADA and the radio spectrum
Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Automation Engineer; Wood Group
System Integrator; Cross Integrated Systems Group
Jose S. Vasquez, Jr.
Fire & Life Safety Engineer; Technip USA Inc.
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me