Security PHA
Security PHA
CHAPTER
4
Book Table of Contents
By Edward M. Marszal
and Jim McGlone
No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written
permission of the publisher.
ISA
67 T. W. Alexander Drive
P.O. Box 12277
Research Triangle Park, NC 27709
4
Process Hazard
Analysis Overview
While PHA methods are routinely used in the wet process industries (e.g.,
c hemical, oil refining and petrochemical) and have been a standard part of the engi-
neering workflow since the 1990s, they systematically assess hazards of industrial
equipment not common to other industries. In these industries, safeguards are based
on prescriptive (i.e., cookbook) sets of rules that come from years of experience with
the same equipment. For instance, consider a boiler. This piece of equipment either
heats water or turns water into steam (which is still technically heating water). Boilers
have been in use for hundreds of years and as a result, designers have learned what
accidents can occur and have applied safeguards to prevent them. This experience is
typically codified in an industry group standard, in this case National Fire Protection
Association (NFPA) 85, Boiler and Combustion Systems Hazards Code. The code is applied
to all subsequent projects to prevent past accidents from recurring. The problem with
this approach is that it presents the answer (i.e., the safeguard that should be used),
but it does not present the question (i.e., what accident scenario the safeguard protects
against). An example from NFPA 85 is the requirement for an automatic shutdown to
39
close fuel gas valves if the fuel gas pressure exceeds an acceptable threshold. Although
the standard lists the requirement, it does not explain the scenario the safeguard pro-
tects against. In this example, the scenario is that the fuel gas valves fail to the open
position, sending a large amount of fuel gas to the burner, which it is not able to con-
sume. This situation can cause the flame to blow out, generating a large gas fuel/air
cloud that can subsequently encounter a source of ignition and explode. This infor-
mation should be of interest to malicious attackers as well as cybersecurity designers
because it defines the accident scenario (or attack vector) that can be exploited to cause
damage.
There are significant advantages that all industries would glean from incorporat-
ing PHA methods. Performing PHA on all industrial equipment has the following
benefits:
• The complete scenarios (attack vectors) that can cause a plant accident are
developed.
• New hazards that come from applying new and less understood equipment can
be identified.
• New hazards that are the result of combining equipment in a new configuration
can be identified.
Because there are so many benefits to performing a systematic PHA, the authors
expect this technique to be increasingly adopted by the complete range of process
industry customers. If for no other reason, the authors anticipate it will be adopted to
develop potential scenarios that may require safeguarding through cybersecurity and
to define the required level of integrity of cyber safeguarding.
All formal PHA methods are exercises in structured brainstorming. They are
designed to stimulate thinking about a topic by providing a prompt to trigger ideas
and a framework in which ideas can be evaluated. The prompts range from check-
list questions or equipment lists to process parameters, depending on the selected
technique. Brainstorming is expected to identify scenarios that the prompt identifies.
The scenarios are subsequently analyzed. PHA techniques are generally applied using
the following steps:
2. Brainstorm about the prompt to identify any credible scenarios related to it.
b. Determine what causes or initiating events can make the scenario occur
(e.g., equipment failures, human error, and external events).
c. For each cause, determine what safeguards are available and to what degree
they are effective in mitigating the scenario under consideration.
d. Consider all available safeguards and determine the likelihood of the acci-
dent scenario occurring.
e. Consider the consequence and likelihood of the scenario in the context of
the organization’s criteria for determining acceptability of risk, and assess
whether the scenario is tolerable as designed or if additional safeguarding
is required.
f. If required, make recommendations regarding redesign or safeguard
implementation/modification to reduce the risk to a tolerable level.
• Checklist
• What if?
While six methods are listed, only four of these techniques are methods for
identifying hazard scenarios, which is the purpose of a PHA activity. The last two
techniques—event tree analysis and fault tree analysis—are used to thoroughly develop
and understand a known hazard scenario.
Checklist is a very simple and common technique. Out of all PHA techniques, it
requires the lowest level of effort. A checklist is usually applied to process equip-
ment that poses a relatively low level of risk. Such risks are well understood because
any company that develops these checklists has many locations with similar pieces
of equipment or processes. For example, a pipeline company might have dozens or
hundreds of pumping stations along a pipeline, each of which are nearly identical.
In this case, a checklist is prepared in which all known hazard scenarios are listed.
An operations/engineering team then reviews it to ensure all items are appropriately
addressed in the design of each facility.
An FMEA is a much more comprehensive and systematic technique than the two
described above. When performing an FMEA, the brainstorming prompts are specific
modes of equipment failure. First, a list of the equipment contained in the process
under study is prepared. Then, a list of failure modes is developed for each piece of
equipment. For instance, if a pump is used in a process, its failure modes might be:
1. Fails to start
Each of these failure modes is essentially a credible cause to explore. Thus, for
each failure mode, the resulting consequence (i.e., the effect) is defined and ranked; the
safeguards that will prevent the effect are listed; and the overall risk is identified and
compared against the tolerable risk criteria. An FMEA is a great tool for thoroughly
analyzing highly mechanical systems. However, the use of FMEA in the wet process
industries has been somewhat limited. The reason is that an FMEA inherently only
regards equipment failures as causes. In the process industries, there are important
causes related to human interaction with processes, chemicals that are not compatible,
and external events—all of which are not adequately addressed by FMEA.
A HAZOP is the most commonly used PHA technique in the wet process indus-
tries because it addresses virtually any hazard scenario and has a systematic approach
This is combined with the technique’s systematic approach to identifying hazards.
While this method is the most time-consuming, it is also the most thorough, making
it the optimal choice in high-risk industries and for processes where in which the haz-
ards are not yet well known or well understood. To perform a HAZOP, the team first
considers a list of parameters that are important to the facility under study. In the wet
process industries, this might be pressure, temperature, or level. For each parameter,
a design intent or normal operating condition is defined. Then, a set of guide words
is applied, defining departures from the design intent that result in deviations such
as higher temperature, lower pressure, and reverse flow. For each deviation, the study
team decides whether the deviation is credible, and if so, if it poses a hazard. For
credible deviations, the consequences, causes, safeguards, and risk tolerability are all
explored to ascertain if the scenario is acceptable. If the risk is deemed unacceptable
for the design, the team provides recommendations.
When a HAZOP is performed, the engineering team examines virtually every pos-
sible deviation from the design intent of the plant and ensures there are appropriate
safeguards to protect against these situations. If the team determines that the degree
of safeguarding is inadequate, it makes recommendations to add new protection lay-
ers, modify the process to make it inherently safer, or improve existing safeguards.
While this process systematically and thoroughly assesses potential hazard sce-
narios, it does not ensure that a plant is inherently safe against cyberattack. Safeguards
are examined to evaluate if they are appropriate; however, the study often does not con-
sider whether the safeguards could have been disabled by means of malicious attack.
The authors propose that this additional step, referred to as a SPR, become a part of
the PHA. As shown in Figure 4-1, for every deviation the HAZOP team encounters, a
CAUSE(S) for that deviation is identified, and all SAFEGUARDS that prevent the cause
from propagating into a loss-of-containment accident are also listed. From a cyberse-
curity perspective, the HAZOP scenario can define an attack vector by deliberately
generating the CAUSE while simultaneously disabling all the SAFEGUARDS through
external control of the industrial control system (ICS) equipment. Based on the authors’
analysis and the paucity of cyberattack examples that have caused physical damage,
this cyber-exposed position is rarely present in well-designed process facilities and
can virtually always be designed out. If a situation does not exist in which CAUSE
initiation and SAFEGUARD disabling can occur as the result of an ICS attack, then the
plant is inherently safe against cyberattack.
• Cause-and-effect diagrams
The information available for a HAZOP should include, at minimum, the P&IDs.
If the P&IDs are not available, it is unlikely that the PHA study will be of any value.
The other documentation does not necessarily have to be available to all study partici-
pants throughout the meeting. It is common to have a single set of some of these docu-
ments for the team to review on demand. It is also common to obtain documentation
as required over the course of the study. Once the HAZOP facilitator accumulates all
the required PSI, node definition and project setup begin.
Node Definition
The HAZOP then evaluates deviations from the design intent. The list of deviations
from the design intent is quite significant. It is common to have 4 deviations and 8
process parameters (for a total of 32 combinations). While it is possible to apply this
set of deviations to each individual piece of equipment and pipe segment, it would
result in a tedious and repetitive study with an interminable duration. Instead,
HAZOP facilitators group equipment with similar operating conditions into nodes.
The following factors are considered when deciding which pieces of equipment to
group together:
• Temperature
• Pressure composition
Once the equipment for a node is grouped together, the intention, design condi-
tions, and operating conditions of the node are documented (as shown in Figure 4-2).
Finally, the P&IDs (paper or digital) are marked, using highlighters or the elec-
tronic equivalent, to provide a visual indication of the extent of the nodes. An example
of marking nodes on drawings is shown in Figure 4-3.
HAZOP Team
Once the facilitator has defined and marked the nodes, the actual study can proceed.
The HAZOP is a team-based workshop for structured brainstorming, with “team”
being the most critical part. A HAZOP is not intended to be a one-person desktop
activity. Rather, it includes multiple members with diverse backgrounds in different
disciplines. Only with this depth and breadth of knowledge, training, and experience
can reasonable results be achieved. There is no fixed formula for how the HAZOP
team should be selected, but the following staff should be considered:
• Operations
• Operations management
• Process engineering
While representatives from these disciplines can provide value, they are not
required to attend an entire meeting, or in some cases, to attend at all. In the United
States, in accordance with the OSHA PSM rule, the only persons absolutely required to
attend a PHA meeting are the facilitator and a representative from operations.
Deviation Development
Once the team is collected for the workshop, they will analyze each deviation for every
node and document the results of the discussion. The deviations that are applicable
will vary from industry to industry and even from process to process. Each deviation
is built from a process parameter that is important to the equipment in the scope of the
study. Guide words are used to indicate how a parameter can diverge from the design
intent. The following is a list of parameters that are commonly used in the process
industries (other industries will use other parameters, such as torque, force, and speed
in the machine industries):
• Pressure
• Temperature
• Level
• Flow
• Composition
• Viscosity
Guide words are then applied to these parameters to create deviations from the
design intent. As with parameters, the guide words are a function of the industry
and type of analysis being performed. Some common guide words from the process
industries include:
• High (more)
• Low (less)
• Reverse
• Misdirected
• Other than
• Abnormal
Once the deviations are built from the parameter and guide-word combinations,
they are listed in the HAZOP documentation tool and addressed for each individual
node. A typical deviation list is shown in Figure 4-4.
exceed maximum allowable working pressure with the potential for rupturing a ves-
sel, releasing flammable material, and causing potential fire or explosion, which could
result in a single fatality of a member of the exposed personnel.” The consequence is
then assigned a category based on its severity. It is important to remember that this
assessment is made assuming all safeguards will fail to operate. A typical table for
ranking consequence severities is shown in Figure 4-5.
Next, the causes of the deviation (high pressure in this case) are determined and
documented. For example, the cause of high pressure might be excessive upstream
pressure feeding into this process section or an external fire near the process equip-
ment. After the causes are documented, each cause is analyzed to identify what safe-
guards are present that might prevent the cause from propagating into the unwanted
accident or loss-of-containment scenario. Some safeguards that might prevent the
overpressure of process equipment include pressure relief valves, SISs that isolate or
stop pressure sources, and operator intervention based on alarms. All applicable safe-
guards are listed. This assessment is done on a cause-by-cause basis because safe-
guards that are applicable to one cause might not apply to a different cause. Once the
causes and safeguards are all documented, the team evaluates the likelihood that the
event and its associated consequence will occur, considering all safeguards that are
available. This assessment is usually done using a likelihood table similar to the one
shown in Figure 4-6.
After the scenario’s consequence and likelihood are defined, the overall risk
posed by the scenario can be determined as it is a function of the combination of
consequence and likelihood. Most operating companies use a risk matrix (such as the
one shown in Figure 4-7) to represent risk tolerability of the various consequence and
likelihood pairs.
The result of the analysis would be a completed worksheet row as shown in Figure
4-8. After the analysis for a deviation is complete, the next deviation is considered.
Once all deviations are analyzed, the next node is considered. And finally, after all
nodes are assessed, the study is complete.
Summary
Understanding and analyzing the risks of the industrial process controlled by an ICS
is a critical part of a well-designed cybersecurity program. Analysis of the computer-
based control equipment alone will not provide a sufficient understanding of the
hazards because the scenarios in which accidents occur can only be understood by
analyzing the process, not the potential ICS failure modes. Understanding the hazards
of industrial processes requires a thorough and systematic analysis of all potential
hazard scenarios with attendant ranking of risks.
Industrial process hazards can be identified and assessed using myriad methods,
but the most common ones include checklist, what if, FMEA, and HAZOP. The HAZOP
method is the most flexible workhorse; it provides the most detail and is especially
useful for situations in which the risk is high or the process and its hazards are not
well understood. A HAZOP considers deviations from the design intent that can occur
in industrial processes, such as higher pressure or reverse flow. If the HAZOP team
determines the deviation is possible, they analyze the scenario. The team identifies
and ranks the consequence severity, identifies the initiating causes for the scenario and
the safeguards that are present, and then evaluates the overall risk. The overall risk is
compared against the risk criteria tolerability and if the scenario’s risk is deemed unac-
ceptable, the team proposes recommendations to reduce it.
PHA, in a formal and documented program, has been successfully applied in the
process industries for over 40 years. The methods are well established and effective, and
engineers, plant managers, and regulators alike respect the recommendations. A logical
extension of the current framework is to examine existing work for necessary insights in
developing cybersecurity programs. While the process industries have a head start, all
industries will benefit from this type of analysis, not only to improve their cybersecurity
position but also to better understand and control their hazards in general.
Exercises
4.1 What is the technique for applying safeguards to hazardous industrial pro-
cesses using “best practice” rules based on past experience without specific
analysis of the hazards present?
A. Performance-based
B. Prescriptive
C. Quantitative risk analysis
D. Hazard and operability study (HAZOP)
4.2 Under what circumstances would a checklist-style process hazard analysis
(PHA) be an appropriate choice for assessing the hazards associated with an
industrial process?
4.3 What is the most common form of PHA used in the process industries?
C. Checklist
D. HAZOP
4.4 A HAZOP considers deviations from the design intent of the equipment under
study. What level of detail is usually applied to the study?
A. Deviations are analyzed for each piece of equipment and pipe segment.
B. Deviations are analyzed for each piece of equipment, but pipe segments are
associated with pieces of equipment and are not analyzed separately.
C. Deviations are analyzed for nodes, which are collections of equipment and
pipe segments with similar process conditions and hazards.
4.5 Which of the following categories of personnel are required to attend a PHA
meeting?
C. Information technology
D. Operations
4.6 What is the most important document to include in a set of process safety
information (PSI)?
B. Cause-and-effect diagram
C. Instrumentation specifications
4.7 What is the prompt for brainstorming in a HAZOP, such as high pressure or
misdirected flow, called?
A. Deviation
B. Process parameter
C. Guide word
D. Checklist question
4.8 What assumptions about safeguards should be made when selecting an appro-
priate consequence and consequence severity category for a HAZOP scenario?
C. Assume that only safeguards that are inherently safe against cyberattack
will operate.
4.9 What approach is typically used during a HAZOP to define the amount of risk
that an organization is willing to tolerate?
B. Risk matrices
4.10 If the risk for a HAZOP scenario is unacceptably high, what is the most appro-
priate response for the HAZOP team?
Bibliography
29 CFR 1910.119. Process Safety Management of Highly Hazardous Chemicals—Compliance
Guidelines and Enforcement Procedures. OSHA (Occupational Safety and Health
Administration). US Federal Register, February 24, 1992.
Center for Chemical Process Safety (CCPS). Guidelines for Hazard Evaluation Procedures.
New York: CCPS, 1998.
Kenexis. Open PHA User Manual Version 1.0. Columbus, OH: Kenexis Consulting
Corporation, 2017.
Marszal, Edward M., and Eric W. Scharpf. Safety Integrity Level Selection with Layer
of Protection Analysis. Research Triangle Park, NC: ISA (International Society of
Automation), 2002.
Edward M. Marszal
Edward M. Marszal, Professional Engineer (PE) and ISA84 Safety Instrumented
Systems Expert, is the president and chief executive officer of Kenexis. Kenexis is
an engineering consultancy dedicated to assisting process industry customers with
assessing the risks that are posed by their plant operations and then reducing those
risks to a tolerable level by the specification of instrumented safeguards, such as safety
instrumented systems (SISs), fire and gas systems (FGSs), critical alarm systems, and
cybersecurity. Marszal is a longtime practitioner and pioneer of the techniques and
tools associated with technical safety and the performance-based design and imple-
mentation of instrumented safeguards.
xiii
of Environmental Protection Agency (EPA) Risk Management Plans with off-site con-
sequence analysis for over 100 facilities. Companies used his recommendations from
these projects to ensure regulatory compliance, justify risk reduction expenditures,
and optimize insurance coverage.
Marszal then co-founded and joined exida. At exida, Marszal was responsible for
helping users and vendors of industrial automation systems develop safety critical and
high-availability solutions. Marszal performed numerous SIS safety life-cycle projects
that included process hazard analysis (PHA) facilitation, Layer of Protection Analysis
(LOPA) facilitation, safety integrity level selection, safety requirements specification
development, start-up acceptance testing assistance (validation), and function test plan
development.
After leaving exida, Marszal joined Kevin Mitchell in the founding of Kenexis,
where he is still employed today. Kenexis was founded to assist process industry users
implement instrumented safeguards.
Marszal has been active in professional societies, an active instructor, and a prolific
author throughout his entire career. Marszal joined the ISA84 committee for the devel-
opment of standards and technical reports in 1994 and has been an active participant
since then. Marszal has been involved in all aspects of the committee’s work but has
been instrumental in leading several technical report efforts, including ISA84 Working
Group 7 that issued technical guidance on performance-based determination of fire
and gas detection requirements.
Marszal is the author of record for ISA’s EC52 Advanced Safety Integrity Level
(SIL) Selection training course, which he presents several times per year in combi-
nation with ISA’s EC54 Advanced Design and SIL Verification course. He is also the
author of the award-winning ISA textbook Systematic Safety Integrity Level Selection with
Layer of Protection Analysis, which is the accompaniment to the EC52 training class.
Additionally, Marszal is the co-developer and frequent presenter of ISA EC56P Fire
and Gas System Engineering: Performance-Based Methods for Process Facilities. In
addition to providing ISA training, Marszal also presents a large amount of Kenexis’
training offerings, which cover a range of instrumented safeguard topics.
James McGlone
James McGlone is the chief marketing officer of Kenexis. McGlone has more than 30
years of experience in the development and deployment of many of the embedded
McGlone started his career in the US Navy as an electronics technician and nuclear
reactor operator on fast attack submarines. McGlone was on the pre-commissioning
crew of two submarines during construction and shakedown, eventually taking the
boats to sea as operational platforms. While in the Navy, McGlone acquired comput-
ers and began programming in various languages including BASIC, COBOL, and
FORTRAN. After 9 years of maintaining and operating nuclear power plants in sub-
marines, McGlone decided to pursue a civilian career as a technical specialist for a
Rockwell Automation (Allen-Bradley) distributor in Akron, Ohio where he solved
challenging applications for drives and motion control systems and learned to pro-
gram programmable logic controllers (PLCs).
After 15 years, McGlone left to become the vice president of Tridium, a Honeywell
subsidiary in Richmond, Virginia where he ran sales and operations. Tridium sup-
plied technology that other vendors deployed under their own brands. This technol-
ogy included nondeterministic embedded programmable controllers, which were
similar to deterministic PLCs but most of the inputs and outputs were remote over
network connections throughout buildings. This technology intrigued McGlone, who
pursued other vendors to deploy it in new and unique ways, including what is com-
monly referred to as the Internet of Things (IoT) today.
After Tridium, McGlone moved back into the industrial software business only
to discover that his passion had shifted, and he needed to solve problems on another
scale. McGlone moved on to bring high-speed inline encryption technology from
government applications into the industrial marketplace when he was introduced to
Kenexis.
At Kenexis, McGlone promotes and deploys the disciplines necessary to build and
operate process systems safely with secure industrial control systems.
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Brief History of Cyberattacks on ICSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Security Level. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Zones and Conduits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Risk Analysis Methods for Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
The Security PHA Review Study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Benefits of the SPR Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Objectives of this Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Motor-Monitoring Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Motor Overload Relays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Motor-Current Monitor Relay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Instrument-Loop Current Monitor Relay. . . . . . . . . . . . . . . . . . . . . . . 77
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Index����������������������������������������������������������������������������������������������������������������������� 147