BTL Mark: Resolve interoperability issues & increase buyer confidence
EMAIL INTERVIEW – Ken Sinclair and Peter Chipkin
Peter Chipkin, Chipkin Automation
Sinclair: I noticed that you (Peter Chipkin) have
recently chosen to focus on the issues of security and how automation
affects ordinary people (like automation engineers). Why?
Chipkin: I frame my concerns in personal terms. I always ask myself, “How will this affect my family and me?”
I also ask: Am I prepared to step out in front of driverless cars as a pedestrian? Will driverless cars / trucks reduce employment, will reduced employment reduce property prices, will that affect me? Will bot receptionists and doctors affect me? Will AI eliminate the need for protocol gateways? Will we need fewer engineers and technicians in the future. Are we automating ourselves out of jobs?
I also ask – what does crappy automation security mean to my family and me? When my local dam, water treatment plant, and energy suppliers are hacked, what will I do? When VISA is down for a week because they have been hacked, how will I buy food? Can I rely on the safety data I am provided?
Automation has never been easier and has
never occurred on such a scale. It’s the right time to ask these
questions because automation will shape the future. However, when I
started in automation in 1987, these questions were not concerning.
Sinclair: What are your biggest specific concerns about security in automation?
Chipkin: I focus on three things.
Don’t forget that critical systems can be dependent on non-critical subsystems. You can attack a data center with a DOS attack, or you can shut down the air conditioning. Same effect.
Sinclair: Do you think
it’s a good thing that more and more automation departments are handing
off security to the IT department since they are experts with the
correct skills to handle the issues?
Chipkin: I think the fact the IT departments are taking control of automation security is a good thing. They start with better skills and training. I find most automation departments love this arrangement as well. It’s a career insurance policy. When the automation is hacked, the facilities department will survive, and heads in IT will roll. But security has a goal that is loftier than job security, and so the transfer of responsibility alone does nothing. IT departments know all about routers, firewalls, authentication, VPN’s, but they know almost nothing about BACnet, HVAC, JACE, LonWorks, PLC’s, zone controllers, and energy metering. Because of that, they are forced to focus on the defending the perimeter. The vulnerabilities that lie within the perimeter are what they tend to ignore.
Sinclair: If defending the perimeter is good enough for IT, why isn’t it good enough for automation?
Chipkin: Because – first, you pass the fence there
are no defenses at all. You are unlikely to find a 20-year-old
computer running a company’s website or payroll system, but you there
is a good chance a 20-year-old controller might be controlling the
light in the operating room, the air conditioning in a data center or
the operation of the flood control gates on a dam. So, you have older
devices being used for automation. Older means that more exploits are
vulnerabilities are known and published. Older also means –
little or no authentication or security. Older might even mean you have
controllers running DOS 6.0 or Microsoft Server 2003 - two very
hackable operating systems.
Because of consequence. It would be inconvenient to live without
Netflix for a week, but it will be far worse if the drinking water for
a major city is unsafe for a week. A nuke meltdown is worse than
a website being offline.
And finally, because of the diversity of manufacturers and embedded
systems and the small production runs automation controllers (it’s not
like smartphones, pads or desktops - which are mass market items), it’s
almost impossible for IT to scan each automation device for to see if
they carry latent attacks. Said another way – there are off the
shelf tools to scan a PC for malware, but there are none to scan a PLC.
Especially a 20-year-old PLC.
Sinclair: Apparently, you think BACnet makes these risks worse?
Chipkin: Yes, I do. At the simplest level, BACnet is self-documenting and supports discovery. The ‘Who-Is’ message gets all devices to announce themselves, so you don’t even need prior knowledge of their existence. Then, all the BACnet objects have meaningful names and often descriptions which can be read right out of the device. So, you can discover a device called “Critical Infrastructure Automation Controller,” and then you can discover that it has a BO object called “Erase Configuration and Restart.” BACnet is peer-to-peer, so any device (even an intruder) can command and change settings. BACnet has no built-in security features. I have many more worries. There isn’t enough space here. Authentication is not used!
It is BACnet’s fault – try and google anything new from the BACnet
Network Security Working Group (NS-WG). There is nothing. Security is
an add-on and was not part of the fundamental design of the protocol.
But, BACnet is no worse than many other protocols. What is really at
fault here is the way we design automation systems and think about
their protection. We need new ways to approach these issues, so we can
continue to use amazing protocols like BACnet in a more secure way.
Sinclair: Can you talk about the best practices going forward? How do we save ourselves from an imminent automation cyberattack?
Chipkin: I recommend you turn to two sources – government and companies with reputations for excellence in this field. For example, Syncrude Canada. Don’t start from scratch.
Companies that are doing this right are spending about 8-9% of the IT
budget on security. Most only spend 1 or 2 percent.
The best practices are emerging, but there is help. The US, Canada, France, Australia and many others are establishing organization and regulations.
For example https://ics-cert.us-cert.gov/
I also call for whistleblower lines / databases so good professionals
can report bad practices. In 2018 we worked with a site that is
running a power generation system using a Windows 2003 Server. As a
citizen, I would have liked to report them for putting a city at risk.
Sinclair: What is an ISAC and how can they help?
Chipkin: Government and regulations are one thing. Co-operation and sharing are another. ISACs are member-driven organizations delivering all hazard, threats and mediation information to members. I.e., competitors are working in a co-operative way to deal with common problems.
ISAC’s are practical organizations focused on outcomes, not on
regulation / compliant.
For example, take ELECTRICITY ISAC - The E-ISAC establishes
situational awareness, incident management, coordination, and
communication capabilities within the electricity sector through
timely, reliable and secure information exchange. The E-ISAC, in
collaboration with the Department of Energy and the Electricity
Subsector Coordinating Council (ESCC), serves as the primary security
communications channel for the electricity sector and enhances the
sector's ability to prepare for and respond to cyber and physical
threats, vulnerabilities and incidents.
[Click Banner To Learn More]
[Home Page] [The Automator] [About] [Subscribe ] [Contact Us]