Multilayer Security Architecture in Industrial Installations Using IIoT

Multilayer Security Architecture in Industrial Installations Using IIoT

It is common knowledge of society, the high level of security of an air traffic control system, where each plane through a transponder emits signals that are captured by radars and plotted constantly on the screen of airport terminal operators in large cities .

All of this requires a degree of sophistication and coordination among different components of the system, with extremely rigid protocols of what can or cannot be done, so that each one knows where they must be at every moment so that a major accident do not occur. Now, imagine this in situations of low visibility and adverse weather conditions, the difficulty is further increased.

To exemplify in an analogous way, in the Industrial environment, SCADA systems are systems that operate in real time and supervise large industrial facilities for monitoring industrial processes that need monitoring at all times due to the strict safety standards required in their daily operation. 

No alt text provided for this image

It is part of a SCADA architecture, the use of software systems through PLC’s (programmable logic controllers) connected to sensors that capture information in real time of real field situations, where this information is processed in an aggregated way, generating alarms in the case of something not expected happens, and displays them in a way that the operator of the industrial process, whether physically present or remotely, can react to situations that require his intervention so that the industrial process indicators can be restored.

Acting in this way, in the constant monitoring of critical industrial processes that involve the most diverse risks, collecting and gathering information from several sensors spread over each vital component of the environment to be monitored. 


Critical industrial processes

For example, we can highlight the need for the presence of sensors along high pressure pipelines or in areas that, due to the presence of flammable gases, need constant monitoring in real time to avoid the risk of explosion.

At this level of criticality, risk management is inherent to the activities and is carried out using advanced analytical systems with artificial intelligence algorithms to detect any deviations from the parameters defined as safe for these facilities. 

In this way, we try to make all the components of a complex system work in a coordinated and synchronized way so that safe levels of operation are reached.

Many of the essential services provided to the population use these systems, from gas pipelines, electric power transmission substations and the water and sewage distribution network are examples of areas where they are used in order to guarantee the excellence of the service provided with high reliability.

Thus, ensuring maximum operational safety for both the public and the employees who provide these essential services is of paramount importance. Before, these systems used to be isolated from the rest of the world, but once they started to have interconnectivity with other systems and with the Internet itself, there was a demand to ensure that these systems remain inaccessible to those who do not have authorized access. 

No alt text provided for this image

This concern is also being extended to critical IIoT (Industrial Internet of Things) systems in areas as disparate as oil drilling in deep waters, mining as in the case of dam monitoring of rejects, as well as systems of Hydroelectric Plants, Nuclear Plants and also the Aeronautical and Rocket Industry.

Each one having its specificity of security levels, being also known as real-time systems, with one of its main characteristics being the concern for the design of high availability and fault tolerance solutions, where a small error can cause a huge catastrophe. 


Information Security

Information security enters the Security architecture as a whole of these facilities as soon as there is interoperability between different systems and within a complex system, a single point of weakness compromises the security level of the entire system, which is why the constant monitoring and surveillance of events by means of artificial intelligence algorithms for the detection of anomalies is the state-of-the-art knowledge to ensure the protection of these systems. 

There is also an increasing proliferation of embedded systems, such as elevators in modern commercial buildings, which can be remotely monitored using sensors and in an emergency one can even try to provide remote assistance.

No alt text provided for this image

Many of these systems, when they have access to Internet connectivity, they are exposed to the possibility of an unauthorized access, with the risk of invasion attempts having a significant impact on the availability of these systems, as well as access to data that can bring problems to the business, such as legal actions due to the several data protection and privacy laws that currently exist in the world, like the European GDPR and the LGPD in Brazil. 


Zero-Trust Policies

In order for this to be dealt with in a manner consistent with the real dimension of the problem and the potential risk represented, a multilayered security strategy is necessary to be adopted, using access policies called “Zero Trust”, that is, if it establishes the authorized access of only those who have the right to access and still only when the access is legitimate for the use to which it was previously stipulated, always checking which resource is being accessed, the level of access and its purpose within contexts foreseen in the authorized use and access policies.

No alt text provided for this image

Therefore, any other attempts to login or access outside the standards previously stipulated in the security policies are denied by default. It does not matter if it comes from remote access or not, nor if it is a mobile device or a notebook connected to the internal corporate network or through an encrypted network, such as VPNs (Virtual Private Networks) for example.

With this, it is possible to stipulate a monitoring of any and all attempts to access and use due to the assets and resources of these systems according to the appropriate security parameters and previously stipulated in the security policies of each organization.


Multilayer Security Architecture

A multi-layered security approach allows risks to be minimized, but there is always a risk of so-called advanced persistent threats that remain dormant for a long period of time, and once SCADA systems connect to corporate networks, attention is needed to the potential risks involved and according to (Kirkpatrick, K.; 2019) in article published in ACM (Association for Computing Machinery), it is reported that in 2018, the ISA (International Society of Automation) published a series of recommendations materialized in the ISA/IEC 62443 standard, designed to develop cyber security standards for industrial applications.

Also according to (Kirkpatrick, K.; 2019) in the same ACM article, the NIST (National Institute of Standards and Technology) also published recommendations in 2018 related to ensuring the safety of industrial manufacturing focused on anomaly detection and malicious users, based on a concept of detection of behavioral anomaly.

No alt text provided for this image

Recently in the media it was announced attacks using ransomware, which paralyzed the activities of organizations in various parts of the world, imagine the scenario in which an industrial plant is paralyzed until the payment of ransomware or by other kind of cyberthreat that ends up blocking access to systems, whether by the encryption of the databases or some other way that makes it impossible for operators to access that industrial process.

And to complicate the scenario in the area of Information Security, many SCADA systems are dated to pre-Internet commercial times, and for this reason they do not have the bare minimum built-in security standards, representing a very high risk their use connected to corporate networks.

For this reason, that a mapping of the entire park of systems installed in industrial parks is something of extreme relevance to guarantee the availability and integrity of the systems and their operation without impacts on critical industrial processes, with the creation of an Information Security Strategy that allows this multilayered protection in an environment with Zero-Trust policies. 


Note: This article is an English translated version of my 2020 original article in Portuguese.


References:


About the Author - Renato Azevedo Sant Anna

Digital Business & Insights Consultant, Thinker and Curator about the VUCA World, with a natural curiosity about the World and its complexity, multidisciplinary knowledge and the ability to produce actionable recommendations and insights about the competitive landscape.

Also a Mentor, Content producer (content writer), Instructor and Speaker on topics related to The Digital Era, Innovation, Entrepreneurship, Technology, Future of Work, Artificial Intelligence Applications for Business and Consumer Behavior on digital channels.

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics