Chapter 1
Chapter 1
Components of an
Industrial Control System
1.1. Introduction
Many ISs only process information, others affect the physical world. It is
the latter that we are interested in this book.
2 Cybersecurity of Industrial Systems
Business
Network
Henceforth, we will use the term ICS to refer to all the computer systems
used to control a physical system.
Services Cloud
Edge Edge
gateway gateway
The IoT refers to the extension of the Internet, that is, the global network for
exchanging information with objects connected to the physical world. The
Industrial Internet of Things (IIoT) is the use of the IoT in the industrial sector.
These objects, more or less autonomous, will transform the industrial world. We
sometimes talk about the plant of the future or Industry 4.0. The potential of this
6 Cybersecurity of Industrial Systems
ICSs then became more and more complex, which could be distributed over
several sites. The solutions that have emerged have been classified into
8 Cybersecurity of Industrial Systems
PLC
Program & Data
Memory
Communications
interface
Programming
station
From a functional point of view, a PLC is the basic equipment for the control
and regulation of physical systems. There are two main types of features:
– the regulation of continuous systems;
– the automation of sequential systems.
In the first case, the objective is to bring a physical quantity to evolve
according to a desired (possibly constant) profile. The system measures the
1 This bus is a computer bus that can potentially be attacked with computer means when
connected to the higher level industrial network. The electrical connections would
require an electrical device to read or modify the values and are less vulnerable.
10 Cybersecurity of Industrial Systems
In the second case, the PLC performs actions from on–off inputs. It can either
perform actions according to measured quantities, for example shutting off a
valve, if a container is filled or perform action sequences to control a device
depending on the measurements and a manufacturing recipe.
1. Recording of
inputs in the IM
IM (Input Memory)
2. Execung the
Instrucon #1
program instrucon
Instrucon #2
aer instrucon using
Instrucon #3 Delays
values from the IM
and access to the OM, Instrucon #4
…
to delays and counters Counters
Final instrucon
OM (Output Memory)
3. Transfer of values
from the OM to the outputs
step
1
PB1 PB2 CR2
transition
CR2 M1 2 M1
Figure 1.9. Programming languages IEC 61131/3. For a color version of this
figure, see www.iste.co.uk/flaus/cybersecurity.zip
12 Cybersecurity of Industrial Systems
Malware can be written directly in these languages (Govil et al. 2018). The
loading of the program into the PLC is not very secure, so this is a major
vulnerability.
In the field of electrical power distribution, the remote control units used to
control the distribution are called intelligent electronic devices (IED). For
example, they act on circuit breakers or transformers.
1.6. Industrial PC
impact of a loss of control. This approach, carried out as part of the functional
safety study, is described in Chapter 8.
From a technological point of view, SISs are often built using specific
PLCs, with reinforced and redundant hardware. One example is the Triconex3
brand, which markets such devices. The functions performed by the SIS are
critical to the security of a facility. If the BCPS fails to maintain the system in a
safe area, the SIS must take appropriate action. It corresponds to a level of
defense-in-depth protection of the physical system (Figure 1.11).
It should be noted that SISs can also be the targets of attacks in order to
create unintentional shutdowns of the production system. Indeed, as the SIS
takes control of the normal control system, it is possible, by attacking it, to
override the actions of the normal control system and cause the system to shut
down.
FI
Safety Instrumented Basic Process Control
Systems (SIS) System (BPCS)
Inputs Outputs Inputs Outputs
M
TI
TI
TI
YH
LI
XL
FI
XLL
Plant emergency
response
Liming effects
Physical security systems
(relief valves; events;
confinement, etc.)
Figure 1.11. The position of the SIS in terms of protection level. For a color
version of this figure, see www.iste.co.uk/flaus/cybersecurity.zip
HMI is an essential part of ICSs. It allows the user to visualize how the
system works and take the necessary actions. Once constructed physically,
with entire walls covered with indicators, dials and adjustment buttons, it has
been replaced by graphic screens, when technological developments have
made it possible. Beyond ergonomics issues, the software and stations used
by these HMIs are also a source of vulnerabilities. The HMI makes it
possible to monitor the system by observing the different quantities and their
evolution, as well as to control the system by launching sequences or
modifying the setpoints. It is possible via these interfaces to act maliciously on
the controlled system, and managing the access control to these stations, either
physically or via a remote connection, is an important point for cybersecurity.
There are several types of HMI: the first are PC workstations running on a
traditional operating system such as Windows and using software to present
synoptics and trend curves. These software are often used in SCADA
supervision stations. The vulnerabilities of these HMIs are those of
traditional computer systems.
HMIs interact directly with PLCs and servers of the ICS. The link and the
protocol used can be a source of vulnerabilities.
1.9. Historians
The physical system is controlled by the PLC in real time. The program to
be executed is developed in a programming environment dedicated to the
brand of the PLC. For example, for Siemens S7 PLCs, there is the STEP 7
environment running on a PC. For Schneider PLCs, we find Unity Pro for the
Modicon range, Concept for Quamtum, TwidoSuite for Twido.
The notion of the IoT (Minerva et al. 2015) is similar to that of CPS. It is
defined by the NIST (Cyber-Physical Systems 2017) as an intelligent system
that includes networks of physical and computer components that interact
with one another.
IIoT devices are the end-points for the Internet of Things, those that are
connected to the physical world. They are characterized by:
– their acquisition and control capabilities, which ensure interaction with
the physical world. Different types of sensors can measure a number of
quantities (temperature, pressure, position, etc.) and are coupled to an analog-
to-digital converter for acquisition. In the other direction, a digital-to-analog
converter is used to control actuators (switches, motors, valves, etc.) or
different output devices (LED, display, loudspeaker, etc.);
– their processing and storage capabilities: a processor, which can be
relatively powerful, is coupled with RAM and non-volatile flash memory;
– their connectivity: an IoT device has features to connect
to a network, either traditional (wired or Wi-Fi) or more specific like
LPWAN (Chapter 2), for example;
– their energy management: not all devices are connected to a power
source and some operate on batteries, such as isolated sensors, or some HMI
devices such as switches. Power can also come from ambient energy trapping
and be limited;
– their ability to be physically secured through a secure storage device,
called a Secure Element. It is a tamper-proof hardware element, capable of
securely hosting applications and storing confidential and cryptographic data;
– their encryption capabilities, which depend on the processor’s
computing capabilities, the presence or not of a dedicated circuit, and of the
energy management.
Switches are the foundation of most corporate networks. Switches allow the
different connected devices to communicate with each other. They manage
the data flow on a network by transmitting a received network packet only to
the devices for which the packet is intended. Each network device that is
connected to a switch can be identified by its network address, allowing the
switch to direct the flow of traffic while maximizing network security and
efficiency.
A gateway connects a network with one or more other networks and can
convert protocols if necessary. The most common task of a gateway is to be
what is called the “default gateway”, the router to which all packets are sent,
when there is no other local route that can be associated with them.
1.12.3. Firewall
sensors and PAC. All data transferred to or from the Cloud pass through the
gateway, which can be a dedicated hardware device. An IoT gateway can
also be called an “intelligent gateway”.
It may have some computing power and perform initial processing on the
data before sending it to the cloud (fog computing, Chapter 2). This
minimizes the amount of data being reported.
Finally, these gateways can validate the rights of IoT devices when they
are added to the network (provisioning).
IoT gateways are connected to platforms that receive, store and use data.
Many platforms, offered by generalist operators and specialists in a field
(maintenance for example), are available in the cloud.
Data Data
Analytics
aggregator transform
Sensor
Edge
gateway
Third party
services
Sensor
Figure 1.14. IoT platform. For a color version of this figure, see
www.iste.co.uk/flaus/cybersecurity.zip
22 Cybersecurity of Industrial Systems
Life periods
State of
Specificaons and Destrucon of
cybersecurity
contract book/ confidenal
during transfer
contractualizaon informaon
to the operator
Taking into account the lifecycle of the ICS is important for the control of
cybersecurity. The lifecycle of installations is quite long, which means that old
equipment has to be managed, which can be a security issue. In addition,
significant changes may occur on the ICS during major changes in the
manufacturing process, which may have consequences for cybersecurity.
Therefore, it is necessary to manage security throughout the lifecycle of the
ICS (PA Consulting Group 2015). In a rather classic way, we distinguish four
key periods: specification, design and integration; operation with associated
maintenance and, finally, decomissioning.
The design and integration phase must take into account security and in
particular:
– the identification of critical assets;
– the definition of a secure architecture;
– the definition of zones and conduits;
– the choice of equipment with sufficient security capacities;
– the definition of basic measures to secure equipment;
Components of an Industrial Control System 23
Following these two phases, the system is transferred to the operator during
commissioning. During this step, it is recommended to carry out an exhaustive
inventory of the system’s cybersecurity level and to ensure that the available
means are available to maintain it at an acceptable level (ANSSI 2013a). For
critical systems, approval is required.
The ICS then moves into the operational phase in which cybersecurity
must be controlled, following an approach such as those presented in
Chapters 8 and 11.