Process Sensor Cyber Security Is A Vital Issue

Process sensors are ubiquitous and are under the auspices of the engineering organizations. Process sensors are the input to control and safety systems and provide input for operator decisions.

Like our fingers, eyes, and ears that provide input to the brain to make the right decisions, if the process sensor input is not secure and accurate, catastrophic failures can occur.

This has often meant that attention to safety, which the engineering organizations understand, has outrun attention to security, which is something that the engineering organizations have tended to view as the responsibility of the IT organization. In turn, the IT organizations have tended to overlook process sensor security, seeing that as an engineering responsibility that’s outside their own scope.

At the process sensor level, however, safety and security are really the same issue.

The Challenge Of Securing Process Sensors

Some example process sensor cyber-related incidents include:

  • Dam collapse from erroneous low-level readings
  • Sensor malfunctioned resulting in the release of 10 million gallons of untreated wastewater
  • Safety relief valve in a nuclear plant did not lift because the pressure sensor never reached its setpoint 
  • One voltage sensor failure in combined cycle plant in Florida caused a 200MW load swing at the plant that resulted in a 50MW load swing in New England
  • Tank farm explosions from erroneous level sensor readings
  • Airplane crashes from erroneous sensor readings
  • Refinery explosion from erroneous sensor readings

Three US national laboratories did a detailed survey issues in 2021 of sensors used in building controls and heating, ventilation, and air conditioning (HVAC), Sensor impacts on building and HVAC controls: A critical review for building energy performance.  According to this document, “Cybersecurity threats are increasing, and sensor data delivery could be hacked as a result. How hacked sensor data affects building control performance must be understood. A typical situation could include sensor data being modified by hackers and sent to the control loops, resulting in extreme control actions. To the best of the authors’ knowledge, no such study has examined this challenge.”

Process sensors have no cyber security, authentication, or cyber logging. Consequently, it is not possible to know whether these incidents were intentional or malicious but made to look like they were unintentional.  

There are three questions that are often asked about cyber security of process sensors:

  • Do you need a physical presence to compromise the sensor? No, it can be done remotely.
  • How much harm can cyber-related sensor impacts cause? The field calibrator calibrates one sensor at a time but connects insecurely to the Internet. The Asset Management Systems (AMS) has access to thousands of sensors. Meanwhile, the AMS has insecure connections to the Internet and often is connected to the Corporate Enterprise Resource Planning (ERP) systems. Some real examples of catastrophic failures from sensor issues were provided.
  • What happens when the compromised sensor data is sent to the cloud to be used in big data analytics for IOT or Industry4.0 applications? The sensor data is assumed to be uncompromised.

These deficiencies lead to a need for a training environment to:

  • Better understanding of how an adversary may interrupt, degrade, or possibly damage and destroy infrastructure.
  • Develop forensic capability to detect process sensor cyber-related issues.

It should be noted that an appropriate training facility would accomplish the above tasks  whether the sensor issues are malicious or unintentional.

Process sensor security may amount to a gap in standards and regulation

Three significant events have highlighetd the importance of estblishing robust cybers security practices:

- Based on discussions with the Transportation Security Administration (TSA), the recognition that the TSA pipeline cyber security guidelines did not address control systems including the sensors.

- The “discovery” in Abu Dhabi that more than 3000 sensors had no ability to have passwords https://www.controlglobal.com/blogs/unfettered/a-vulnerability-worse-than-log4j-and-it-can-blow-up-facilities-and-shut-down-the-grid/.

- The realisation that current pipeline cyber security guidelines effectively excluded the process sensors -  "Inventory should not include individual instruments that are not network connected".

As the cyber insecure sensors in the Abu Dhabi petrochemical plant show, digital sensors have built-in backdoors for performing remote calibration and other maintenance activities. That makes sense as a convenient, labor-saving design feature. It makes the sensors easier to upgrade and maintain. These same backdoors, however, can be exploited as vulnerabilities, even when the sensors do not appear to be connected to networks.

In essence, the backdoor in the process sensors allows for two-way communication to/from the Internet with no cyber security protection.  

An indication of the disconnect between engineering and cyber security is that many engineers would be willing to pay extra to have the backdoors because it makes their jobs easier despite the cyber risk. The same cyber vulnerabilities in the process sensors also exist for the field calibrators and the AMS. At the 2016 ICS Cyber Security Conference, the U.S. Air Force Institute of Technology (AFIT) and a Russian security researcher independently demonstrated how process sensor cyber vulnerabilities could be exploited. 

While considerable progress has been made for control system (Guidance now exists with the ISA/IEC-62433 standards, NIST SP800 series standards, and various other guidance documents), however, these standards do not yet address cyber security considerations at the lower levels and additional research, training, and testing to improve process sensor cyber security is required from both industry and government.

The discussions must be trans-disciplinary and must include engineers and facility operators as well as IT and OT networking personnel. The numerous actual control system cyber incidents clearly demonstrate that current approaches fail to sufficiently consider the engineer/operator roles and responsibilities in identifying and mitigating threats. This will need cooperation between physical security, network security, and engineering/operational security disciplines which can be fostered and enhanced via collaboration between professional associations and industry groups. 

The networking community currently dominates cyber security and views all sectors as effectively being an extension of IT. Meanwhile, the engineering community has limited participation in cyber security decision making process as the engineering equipment that is often vulnerable is ignored by networking cyber security. 

 A cross-disciplinary approach represents an important first step in bringing the engineering discipline to help address the cyber security of control systems which is generally not done when the focus is just securing the networks.

There are two distinct categories of process sensors to be addressed:

  • Legacy devices - These are the devices currently in use and those still being built. There is no cyber security in these devices or cyber security standards to address these device limitations.
  •  Nextgen devices - Nextgen is still “on the drawing board”. ISA/IEC62443-4-2 can addresses these devices. However, at today’s funding level, Nextgen is arguably years from a prototype.

Historically, the network community has questioned whether process sensors should be within the scope of cyber security efforts. They question if process sensors are computers and if they are on networks. Process sensors may not look like computers, but they have similar components such as microprocessors which perform familiar computing functions. Sensors are also on networks, often serial as opposed to routable networks.

The confusion may arise because many in the networking community view networks as being routable networks and therefore don’t recognize serial networks as being networks.

A way forward for process sensor security

Consideration should be given to establish a formal Group involving the relevant are engaged to develop policy and to determine what organizations are best suited to oversee this new and expanding area of training and research for control system field device cyber security.

This Group should develop a White Paper to clearly define what is unique about legacy control system field devices and what needs to be done to provide improved cyber security and identify the resources needed  to speed up  developing cyber security standards, frameworks, recommended practices, and information sharing.

Historically, standards have been driven by industry. It’s time for the industry that relies on process sensors to take the lead in closing the gap between cyber security and safety engineering.

Joe Weiss is Managing Partner at Applied Control Solutions

You Might Also Read:

Industrial Control System Security Is Overlooked:

 

« North Korean Hackers Stole $400m In Crypto Currency
REvil Cyber Ransomware Gang Members Arrested »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.