Cyber security standard aims at critical infrastructure in process industries
The International Instrument Users Association (WIB), an international organization that represents global manufacturers in the industrial automation industry, announced the second version of the Process Control Domain Security Requirements For Vendors document – the first international standard that outlines a set of specific requirements focusing on cyber security best practices for suppliers of industrial automation and control systems.
“We are pleased to announce today the second version of our cyber security standard,” said Alex van Delft, competence manager for process control at DSM and chairman of the WIB. “This is an important step in the ongoing process to improve the reliability of our critical manufacturing and production systems, and provides end-users the ability to communicate their expectations about the security of process automation, control, and safety systems.”
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems. Whether it is a targeted attack like Stuxnet, or an accidental disruption, a single cyber incident can cost millions of dollars in lost revenue, jeopardize employee and public safety, and potentially disrupt national critical infrastructure.
“Our increasingly connected production systems are facing a growing threat on a daily basis and we must do all we can to ensure a safe and secure operational environment,” said Peter Kwaspen, strategy and development manager, EMEA control and automation systems at Shell Projects & Technology. “This document provides the common language we need to communicate our expectations around security to our suppliers and the framework to work together to help improve the overall security posture for our critical systems.”
Led by major companies such as Shell, BP, Saudi Aramco, Dow, DuPont, Laborelec, Wintershall, and dozens of other end-users, as well as leading vendors such as Invensys, Sensus, and multiple government agencies, the group spent two years developing the requirements and piloting a certification program to ensure a functional, scalable, and ultimately valuable result.
“The security requirements outlined in the document went through a year of comments and revisions from over 50 global stakeholders and were subjected to a thorough pilot certification program over the last eight months,” said Jos Menting, cyber security advisor GDF Suez Group. “We’ve now come to a truly functional cyber security standard based on the needs of end-users and it is now up to us, the end-users, to take advantage of this effort and insist that our vendors are certified.”
Members of the WIB Plant Security Working Group have already started implementing the requirements into their procurement processes and others around the world are heeding the call. “Shell has mandated conformance to the WIB standard for all vendors supplying systems to be deployed in Shell’s process control environment starting January 1, 2011,” said Ted Angevaare, PACO EMEA control and automation systems team leader. “These requirements will become a standard part of the procurement language saving us a significant amount of time and effort.”
Leading suppliers of industrial process control and automation systems are also starting the process of integrating the requirements into their organizations. “Adopting the WIB’s security requirements ensures that Invensys has a set of measurable practices in place that enforce a safer and more secure critical infrastructure. Not only do the requirements provide current-state measures, they allow us to continue to improve and adapt to the ever-changing security landscape,” said Ernie Rakaczky, program manager for control systems cyber security at Invensys Operations Management. “From our perspective, this program is a major shift, not only focusing on tactics, but one that puts into place strategic elements that address operational change.”
Cyber security at all stages of the industrial product lifecycle
The WIB standard is designed to fit the needs of end-users – the system owner/operators – and reflects the unique requirements for industries like oil and gas, electric power, smart grid, transportation, pharmaceutical, and chemical. The goal is to address cyber security best practices and allocate responsibility at various stages of the industrial system lifecycle: Organizational practices, product development, testing, commissioning, maintenance, and support.
“Security is not a one-time application, but rather a process in which every stakeholder must contribute in order to achieve any significant improvement in operational reliability,” said Auke Huistra, project manager at National Infrastructure against Cyber Crime (NICC). “The WIB requirements are designed with this principle at its core and we are encouraging critical infrastructure stakeholders in The Netherlands to integrate the requirements into their cyber security plans.”
The requirements were also constructed to address a broad range of cyber security topics relevant to industrial stakeholders; from high-level requirements for vendor’s internal security policies, procedures, and governance, to specific requirements concerning access, authentication, data protection, default password protection, and patch management. When a vendor’s solution complies with this set of requirements, the solution is considered by the WIB to be Process Control Domain Security Compatible.
The requirements are further broken down into 3 levels designed to reflect various starting points of global suppliers and provide a scalable framework to plan improvements over time. In the program, there are Gold, Silver and Bronze levels, each consisting of a set requirements designed to verify that applicable policies and practices are in place, enabled and practiced by the vendor.
Successful global cooperation
From the beginning, industry leaders recognized that given the global nature of industrial cyber security, any effort to standardize cyber security best practices would require stakeholder cooperation from different industry sectors and in different regions of the world. The WIB association was the ideal conduit to guide creation of the standard given its independent nature and membership composition. Moreover, the initiative needed to reflect and incorporate the important cyber security activities happening internationally. Many government agencies, industry working groups, and standards bodies were consulted to ensure harmony. For example, major industry standards efforts such as ISA SP99, NIST 800-53, NISTIR 7628, and various international government regulations such as NERC/CIP were reviewed and incorporated where appropriate or expanded to ensure testability. The WIB executive committee has started the process of introducing the WIB PCD requirements into the CEN/CENELEC and IEC international standards framework.
Edited by Peter Welander, email@example.com
Visit the Control Engineering Plant Safety & Security Channel.