Plant floor cyber security—turning discussion into action

Last month we explored why plant floor cyber security should be on your agenda. Here in Part 2 we focus on how to establish a serious and open dialog, develop strategies, and tap outside resources.

Cyber security
Cyber security

As we continue our exploration of plant floor cyber security, we need to develop strategies that work for our particular situation and seek guidance from a variety of outside resources. We can then turn discussion into meaningful action. This month’s concluding segment on plant floor cyber security is intended to provide some suggestions to facilitate this process.

It may help to begin by familiarizing ourselves with some new terms. The “actors” are those individuals who take part in creating a cyber security attack or breach. Actors may be nation state agents, organized criminals, lone wolf criminals, bored teenagers, disgruntled employees, or paid informants. Many of these are hackers. There may be “white hat hackers” who seek out “vulnerabilities” in systems for the purpose of protecting against a breach, referred to as ethical hacking. The “black hat hackers” will seek out and exploit vulnerabilities for malicious purposes. “Grey hats” may seek out the same vulnerabilities to sell them to the highest bidder or to claim bragging rights. Each of these groups may be “probing’” our systems and our people as they seek to find and exploit these vulnerabilities.

Not all actors are hackers however. Some may simply be individuals who have obtained legitimate access to systems and use it for malicious purposes. Often such people are not intending to do harm, but are duped by “phishing” or “spear-fishing” attacks where the bad actors seek accomplices who unknowingly provide information that may be used in a more damaging attack. Manufacturers are among the most frequently targeted by spear-fishing attacks. Bad guys go after the weakest link in the chain—the people. Criminals will follow your employees home to steel information that will allow them access to your systems.

It has been said that cyber security requires the integration of psychology and engineering, because understanding the motivation of the people trying to infiltrate our systems is critically important. Too often we make our plans assuming that we operate in an honest and ethical society. When it comes to cyber security, we can no longer assume that. Just because our plant sits in a valley of tranquility, those seeking to do us harm may be anywhere in the world where the values and mores are beyond our understanding. Motives may include terror, espionage (national, industrial, commercial, or private), hactivism (activism motivated by social, political, or ideological beliefs), financial gain, revenge, notoriety, or vandalism.

Our “attack surface” is the amount of area we expose to an actor. The more network connections we have, the more internet connected devices we have, the greater our attack surface and the more likely it is that there will be vulnerabilities. In years past, we could secure all of our assets, both physical and intellectual, by creating a security perimeter around our plant. Only people trusted to enter or leave that perimeter were permitted to do so. We could physically lay eyes on every person, and if we chose, on every document, that crossed the physical perimeter. We could send security personnel to patrol that perimeter and validate its integrity day or night. We could look for holes in the chain link fence or for fire doors left ajar. We could monitor everything with cameras and motion sensors if deemed necessary. Today if we have a network connection, our perimeter is much different. It is not without meaning in this regard that the term “perimeter” implies only two dimensions while the term “surface” implies three.

An “attack vector” is the means or path that an actor uses to gain access to his target. By finding a vulnerability on the attack surface, he exploits that as a means to perpetrate his attack. He might use a receptionist to obtain a legitimate username and password. He (or his robot) might dial thousands of mobile numbers until he finds a broadband modem attached to a piece of factory equipment. He might have an employee attach a cell phone to a network plug that was relocated to the outside of a control panel for safety reasons. He might piggyback on a VPN connection. He might infect a service technician’s USB drive, knowing that it will be plugged into a machine that can later become the attack vector.

Nature of solutions
As was stated earlier, this is not intended as a how-to guide. But in the process of developing this article, some general strategies emerged. Here are some of them.

Peter Holicki of Dow Chemical in an ARC Industry Forum keynote address affirmed that technology requires strategy, business alignment, and business ownership. Dow does not let companies that own the technology control them, DOW controls the technology. This is a tenet that I strongly support, especially as it pertains to the security of our intellectual property, our operations, our people, and our products. Manufacturers should have shop floor technology plans that align with their business, financial, marketing, HR, and security plans.

In that same session, Brigadier General (Ret) Gregory Touhill of the US Department of Homeland Security explained that cyber security is misunderstood as a technology issue for discussion in server rooms when in fact it is a risk management issue for discussion in classrooms, lunchrooms, and boardrooms. It is a matter of risk for everyone in our society.

Cyber security is a team sport. We need our plants to be safe, secure, and resilient. The first thing to do is to put it on the agenda, and keep talking about it until it permeates every part of the company. Help your employees with security not only in the office, but at home. Then discuss with your partners up and down your supply chain.

Cyber security needs to be raised to the level of safety in our plants. A safe work environment is a condition of doing business (a license) in today’s world. A cyber-secure environment should also be a requirement. As we are required to report lost time accidents to OSHA, we should be required to report cyber security incidents as the Germans are already doing. One CPG representative told me that they were treating cyber security like safety and like sexual harassment awareness, where every employee is required to attend training and retraining. We need to create a cyber security aware culture in our plants. This is probably one of the most important steps to be taken.

Realize the impossibility of protecting all of your information to the same level. Moltke the Elder taught that in warfare, he who defends everything defends nothing. Identify where the really important data is (maybe in the process control system, not the office) and apply more resources there.

Realize that you can’t harden everything. There are still tens of thousands of systems in the plants running unsecure-by-design systems such as Windows 98 and XP. These aren’t going away anytime soon. Think of a turtle. These soft structures can be surrounded by a hardened shell of hardware and software that monitors all of the assets and controls any information flow to or from them. While you cannot hope to keep software up to date on all of the connected devices, you can apply daily patches to the system comprising the shell to keep it as secure possible. This will require dedicated staff who understand both IT and control systems. And, this is not the long term solution. In parallel with this approach, we need to take a ‘secure by design’ approach for new systems.

Planning should be multi-dimensional including plans for protection, prevention, mitigation, response, and recovery. Our systems must be both safe and, when things to go wrong, resilient.

If you allow external connections, make everyone come through a common and closely managed access point. It is like having only one entrance to your plant.

Establish, communicate, and enforce strict policies regarding who can authorize the addition of ANY device onto a network or the addition of any communications access to a machine. Is your landlord or your building management department making connections that your process control or IT departments don’t know about? Is the cafeteria or the lab having their equipment monitored remotely? If so, chances are good that there are cross connections to your internal networks.

List: Digitalization Companies From PACK EXPO
Looking for CPG-focused digital transformation solutions? Download our editor-curated list from PACK EXPO featuring top companies offering warehouse management, ERP, digital twin, and MES software with supply chain visibility and analytics capabilities—all tailored specifically for CPG operations.
Download Now
List: Digitalization Companies From PACK EXPO