Yokogawa Security Assessment How do you know if your industrial plant is sufficiently protected? Yokogawa Europe B.V. July 2014 Yokogawa Security Assessment version 1.1 Yokogawa Security Assessment Introduction How do you know if your plant is sufficiently protected? And which investments are essential to keep your plant protected in the future? If you are not completely confident about your security approach and policies or if you need help convincing your management about some necessary security investments, Yokogawa’s security consultants can help you by conducting a security assessment. The outcome of this assessment is a clear report that will list your vulnerabilities and indicate the actions you can take to rule out and mitigate them. To assist and advise customers on these matters Yokogawa has developed a security assessment. In this assessment the security countermeasures at a site location will be checked and it will assist you to determine if improvements are necessary. This document is especially intended for Plant Managers, owners, or stakeholders. In general it is designed for professionals who are ultimately responsible for any incident that may occur, and therefore have to deal with the consequences. Benefits of the assessment Why should someone invest in security? On the first impression an investment in security will not make the plant more productive. An investment in security should therefore primarily be seen as insurance: spending money on security is similar to spending money on a health insurance. If you don’t have insurance, only one incident may cost you an amount of money that will exceed the costs of insurance for the entire lifecycle of your plant. When considering implementing new security measures, the first step is to identify what you want to protect. Next step is to calculate the value of what you are protecting. Then, after successfully completing the first two steps, you can start to assess the threat, the risk and the vulnerability. What will happen if your plant is hacked? When your plant is targeted by hackers, potentially harmful viruses will float inside the DCS or SCADA, not intentionally harming the system, but consuming system resources and network resources, which can influence the system performance. However, it could be worse if all systems are wiped blank, leaving the Microsoft Operating System to fail and therefore the Human Machine Interface (HMI) will fail 1|Page Yokogawa Security Assessment version 1.1 as well. The plant will continue to work, but no visualization or manual control is possible. Usually, at this point, operators will stop the plant, which results in production loss. A hacker can also take control over parts or even the complete plant or factory. Programmers with malicious intentions can decide to place ‘ransom (soft)ware’, thereby taking over the whole system at a site If you want to read more location. And like a hostage, hackers will demand money before about Plant Network Security, control is given back to the operators. please read the Yokogawa Plant network security Plant Network Security whitepaper (2014). Available at www.yokogawa.com/eu In all the examples above, production can be lost, and in case of shutdowns, environmental damage may occur, which might damage your company’s reputation. Luckily it is possible to mitigate the security risk with proper security countermeasures. The whitepaper will explain more details about security in depth and shows how a system could be protected. This assessment is especially intended for Plant Managers, owners, or stakeholders. In general it is designed for professionals who are ultimately responsible for any incident that may occur, and therefore have to deal with the consequences. Flow of the assessment The flow of the security assessment for typical industrial plant’s is as follows: 1. Gather documentation from site, drawings, requirements 2. Pre-Audit study 3. Data Collection by questionnaires 4. Execute a number of non-intrusive tests 5. Write a report with the outcome of the document Step 1: Gather documentation from site The Yokogawa security specialist will request ‘the as build system documentation’, the documentation that is most up to date, to get a clear picture about the network setup like hardware configurations. He or she must also clarify the software that is being used. Some Plants have local security guidelines/standards, and some countries have special laws concerning the security implementation. All these things must be taken into account. 2|Page Yokogawa Security Assessment Step 2: version 1.1 Pre-Audit Study The Yokogawa security specialist will study the gathered documentation. If any questions that a security specialist considers important to ask upfront come up during this phase, they can be answered or looked into during this step. Step 3: Data collection During this step of the assessment the Yokogawa security specialist will be focusing on collecting information and data (network and system drawings). This documentation enables the Yokogawa security professional to create a customized network assessment worksheet, tailored to the customers’ environment and the objectives. This customized worksheet may contain policies and procedures, which will be further explained at page 4 of this document. Step 4: Execute Non-intrusive testing Part of the assessment is non-intrusive testing. During these test we will check log files of network devices and of the machines. Also patch updates will be checked by the use of non-intrusive packages. Moreover, system settings will be collected if more information is needed while writing the report. Step 5: Creating a clear report The Yokogawa security consultant will put all the pieces of the puzzle together and will write down the findings in a clear report describing the strengths and weaknesses of the system. If a weakness is found a proposal for a remedy will also be added to the report. Last but not least, Yokogawa likes to point out that it is advisable to do the security assessment on a regular base, as security requirements are always changing. Yokogawa recommends making this a standard option in the Life cycle maintenance contract. Out of Scope! -Intrusive TestingMany people will expect that intrusive testing or port scans are part of the assessment. In the IT world this is indeed the case. However, in the process control world we classify this as a major risk and therefore we only do realtime intrusive testing when a plant is not producing. 3|Page Yokogawa Security Assessment version 1.1 The basic outline of a good defence The outlines of a steady defence consist out 5 elements (see fig 1): Policy; Procedures; and Host Based Security Physical Security; Network security. 1. Policy When performing a network security assessment this should preferably be based on one of the documents obtained from the customer. This document determines largely what security controls must be applied to the network and systems running on the network. This document must provide clear and concise objectives which will be translated into procedures. If this document does not exist, guidelines need to be defined during step 1. 2. Fig. 1: The basic outline of a good defence, including Procedures and Policies Procedures Procedures are detailed instructions about how a policy is to be implemented. Written procedures enforce consistency in the application of security controls specified in the security policy. Procedure documents can provide a measure of effectiveness for applying controls. There are 4 high level procedure chapters which are explained below 2.1 Configuration Management Configuration management processes and procedures are implemented to archive and approve any changes to the process control network. By applying configuration management processes the likelihood of problems will be reduced since all changes are registered. Should any issues arise, a trail of logged information will make trouble shooting much easier as it will be possible to retrace the point where the issues or incident appeared. 2.2 Information Management Information management determines how an organization handles information from the moment it is created up to (and including) the moment of disposal. This includes how documents are managed, classified and stored. If there are any regulatory requirements and laws this will also affect how information is handled and when and how it can be destroyed. If information is transferred between people or systems, requirements may be specified on how this can be done effectively. 4|Page Yokogawa Security Assessment version 1.1 2.3 Change management For this security assessment change management determines how an organization takes care of changes within a process control network environment. It looks at the impact of changing technologies, systems, new applications, enhancements and other significant changes. The objective of change management processes is to document and approve changes by proper authorities before it is implemented. As part of the change management it would be highly recommended to have a procedure in case a major change is to be carried out, so that everything and everyone involved is documented. The impact of changes should be considered as well, and any mitigating actions should also be stated. 2.4 Incident Management Incident management is the monitoring and detection of security incidents. This includes a process to detect, correct, gather evidence, minimize impact and learn lessons from earlier vulnerabilities. It is recommended that there is a person or a team to deal with security incidents. 3. Physical Security Physical security will address the options a malicious person has to physically reach devices, like network equipment or servers. The effectiveness of physical controls such as locks, perimeter fences and video surveillance fit into this category. 4. Network Security The network provides a transport mechanism for data communications. This is the foundation for the infrastructure that applications need in order to work; without it, equipment will not be updated or patched. Security controls are required to ensure that the network remains available. 4.1 Network Architecture Network architecture is about the layout of the network. This can be approached both logically and physically. - - The logical layout is about the data flows through the network. By examining the logical layout, communication flows between applications and parts of the plants become clear and therefore it is possible to assess the security zones. The physical layout will enable you to detail which devices are connected to the network, and what connections to outside network, such as the office network, exist. Using both the logical and physical layout of the network infrastructure will help identify any vulnerabilities or inefficiencies. 5|Page Yokogawa Security Assessment version 1.1 4.2 Firewall A firewall is the boundary between the process control network and the outside networks. It is usually implemented as filter traffic based on IP address, ports and protocols. Firewalls can also provide protection against malicious behaviour such as ports scans, network floods, ping of death and other type of DoS (denial of service) attacks. In order to evaluate the effectiveness of the firewall, the required traffic flows across the firewall need to be clear. This will make it possible to determine what appropriate rules need to be applied. Over time these rules may be modified to such an extent that the effectiveness of the firewall is reduced. Part of the assessment would be to identify obsolete or overlapping rules. 4.3 Routers & Switches Routers and switches provide the connection between the applications and the hardware components of the process control system. To ensure that the network remains available the switches need to be hardened to prevent unauthorized traffic onto the network. Additionally, management connectivity to the switches should also be restricted to prevent any unauthorized changes to the switch configuration. 4.4 Remote Access In the past, remote access connections were provided by dial in modems. At the present time internet connections with VPN are mostly used. Regardless of the type of access, all remote connectivity should be checked on authorization, confidentiality and integrity. Additionally these connections should not provide a backdoor into the network, which can be a threat. 4.5 Wireless Within the Process Control landscape wireless LANs will become vital in the future. Wireless exists in two forms: 1. Wi-Fi, also spelled Wifi or WiFi, is a local area wireless technology that allows an electronic device to exchange data or connect to the internet using 2.4 GHz UHFand 5 GHz SHF radio waves. 2. ISA100. The ISA100 protocol is used by field equipment to wireless transfer measurements to the process control system. During the assessment, checks will be done to verify the security countermeasures and to check the implementation. 6|Page Yokogawa Security Assessment 5 version 1.1 Host Based Security Host based security is focusing on protecting the “host” (workstations and servers) from malicious or accidental actions. Malicious actions, whether intended or unintended, may cause data loss or unauthorized access to the system. As the hosts are often based on Microsoft operating system, there are many vulnerabilities and threats. 5.1 Antivirus Management There is always the possibility that a host gets infected with malware which may negatively impact the process control system or even crash the system completely. Since new malicious software is always being developed, antivirus software manufacturers constantly have to come up with solutions to counter these new threats. The assessment will check whether or not there is an effective and up to date antivirus product/solution. Additionally measures against “zero day” attacks can also be assessed. These Zero day attacks can take the form of Advanced Persistent Threats (APT’s) and therefore they are often not detected by firewall or antivirus systems. One of the few methods to detect an APT is to know what the normal behaviour of the system is. When there is unusual activity such as unexplained traffic spikes or data going to unexpected IP addresses this must be investigated. 5.2 Backup Management You cannot secure something for a full 100%. It is always possible that that something goes wrong. Therefore the assessment should be able to identify data assets, how these assets are backed up and what the potential data loss would be. The assessment will also evaluate how effectively the process control system can be recovered in terms or time and data integrity. 5.3 Patch Management Operating systems and software can contain faults and vulnerabilities that can be exploited. These vulnerabilities can be backdoors, buffer overflows, system crashes or memory leaks. To manage this, an inventory of software running in the systems must be maintained. To fix bugs and plug vulnerabilities, a patch update strategy must be put in place, ensuring that new patches are installed and will not inhibit the functioning of any applications on the network. 5.4 System Hardening System hardening is about minimizing the attack surface by removing software, stopping services and disable ports that do not need to be used. Furthermore any devices such are USB ports and CD drivers can also be disabled. Also unauthorized access from the operator interfaces into the operating system will be checked. 7|Page Yokogawa Security Assessment version 1.1 Recommendations If you are not completely confident about your security approach and policies or if you need help convincing your management about some necessary security investments, Yokogawa’s security consultants can help you by conducting a security assessment. The outcome of this assessment is a clear report that will list your vulnerabilities and indicate the actions you can take to rule out and mitigate them. About Yokogawa Helpful Resources Plant network Security Whitepaper - 2014 (by Yokogawa) Brochure Cyber Security for Industrial Control Systems (by Yokogawa) Video: Security: YOKOGAWA IA System Security Solutions (YouTube) Read more about Security in general on our website Read more about SCADA & Cyber security on our website Contact us For more information please visit www.yokogawa.com/eu to find contact information for Yokogawa in your area. For Europe please send an e-mail to [email protected]; a Yokogawa security expert will get in contact with you. You can also use the digital contact page to get in contact with a Yokogawa Security Expert. 8|Page Yokogawa Electric Corporation is a Japanese electrical engineering and software company, with businesses based on its measurement, control, and information technologies. Every high-technology product from Yokogawa has to fulfill three basic criteria: Quality, Innovation, Foresight. We are one of the world leaders in industrial automation and control, test and measurement, information systems and industrial services. Besides being high quality, innovative and advanced, our products are also safe and durable. In other words, we supply smart technology, made by smart professionals. Many of our customers are major and global names in oil and gas upstream and midstream, refining and petrochemical, power and energy industries.
© Copyright 2026 Paperzz