The International Instrument Users Association (WIB) announced the second version of the Process Control Domain — Security Requirements For Vendors document — an international standard that outlines a set of specific requirements focusing on cybersecurity best practices for suppliers of industrial automation and control systems.
"We are pleased to announce today the second version of our cybersecurity standard," said Alex van Delft, competence manager process control at DSM and chairman of the WIB. "This is an important step in the ongoing process to improve the reliability of our critical manufacturing and production systems and provides end users the ability to now communicate their expectations about the security of process automation, control and safety systems."
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems. Whether it is a targeted attack such as Stuxnet, or an accidental disruption, a single cyber incident can cost millions of dollars in lost revenue, jeopardize employee and public safety and potentially disrupt national critical infrastructure.
"Our increasingly connected production systems are facing a growing threat on a daily basis, and we must do all we can to ensure a safe and secure operational environment," said Peter Kwaspen, strategy and development manager, EMEA control and automation systems at Shell Projects & Technology. "This document provides the common language we need to communicate our expectations around security to our suppliers and the framework to work together to help improve the overall security posture for our critical systems."
Led by major companies such as Shell, BP, Saudi Aramco, Dow, DuPont, Laborelec, Wintershall and dozens of other end users, as well as leading vendors, such as Invensys and Sensus, and multiple government agencies, the group spent two years developing the requirements and piloting a certification program to ensure an functional, scalable and ultimately valuable result.
"The security requirements outlined in the document went through a year of comments/revisions from over 50 global stakeholders and were subjected to a thorough pilot certification program over the last eight months,” said Jos Menting, cybersecurity advisor GDF Suez Group. "We've now come to a truly functional cybersecurity standard based on the needs of end users, and it is now up to us, the end users, to take advantage of this effort and insist that our vendors are certified."
Members of the WIB Plant Security Working group have already started implementing the requirements into their procurement processes and others around the world are following.
"Shell has mandated conformance to the WIB standard for all vendors supplying systems to be deployed in Shell's process control environment starting January 01, 2011," said Ted Angevaare, PACO EMEA control and automation systems team leader. "These requirements will become a standard part of the procurement language, saving us a significant amount of time and effort."
Leading suppliers of industrial process control and automation systems are also starting the process of integrating the requirements into their organizations.
"Adopting the WIB's security requirements ensures that Invensys has a set of measurable practices in place that enforce a safer and more secure critical infrastructure. Not only do the requirements provide current-state measures, but they also allow us to continue to improve and adapt to the ever-changing security landscape," said Ernie Rakaczky, program manager for control systems cybersecurity at Invensys Operations Management. "From our perspective, this program is a major shift, not only focusing on tactics, but one that puts into place strategic elements that address operational change."
The WIB standard is designed to fit the needs of the end user — the system owner/operator — and reflects the unique requirements for industries lsuch as oil and gas, electric power, smart grid, transportation, pharmaceutical and chemical. The goal is to address cybersecurity best practices and allocate responsibility at the various stages of the industrial system life cycle: organizational practices, product development, testing and commissioning, and maintenance and support.
"Security is not a one-time application, but rather a process in which every stakeholder must contribute in order to achieve any significant improvement in operational reliability," said Auke Huistra, project manager at National Infrastructure against Cyber Crime (NICC). "The WIB requirements are designed with this principle at its core, and we are encouraging critical infrastructure stakeholders in The Netherlands to integrate the requirements into their cybersecurity plans."
The requirements were also constructed to address a broad range of cybersecurity topics relevant to industrial stakeholders; from high-level requirements for vendors' internal security policies, procedures and governance, to specific requirements concerning access/authentication, data protection, default password protection and patch management. When a vendor's solution complies with this set of requirements, the solution is considered by the WIB to be Process Control Domain Security Compatible.
The requirements are further broken down into three levels designed to reflect various starting points of global suppliers and provide a scalable framework to plan improvements over time. In the program, there are Gold, Silver and Bronze levels, each consisting of a set of requirements designed to verify that applicable policies and practices are in place, enabled and practiced by the vendor.