Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
Abstract
:1. Introduction
2. Brief Presentation of the Framework and Components
2.1. Overview of IT and OT Systems and Their Convergence
2.2. Functional Safety of OT Systems
- The requirements imposed on the performance of safety functions designed for hazard identification;
- The safety integrity requirements, i.e., the probability that a safety function will be performed in a satisfactory way when a potentially hazardous situation occurs.
- The probability of failure on demand average (PFDavg) of the safety-related ICS in which the considered safety function is implemented, operating in a low-demand mode (LDM); or
- The probability of dangerous failure per hour (PFH) of the safety-related ICS operating in a high- or continuous-demand mode (HCM).
- A plan for operating and maintaining E/E/PE safety-related systems or SIS;
- Operation, maintenance, and repair procedures for these systems over their whole life cycle;
- Implementing procedures;
- Following maintenance schedules;
- Maintaining relevant documentation;
- Periodically carrying out functional safety audits;
- Documenting any modifications to the hardware and software in E/E/PE systems.
- The results of functional safety audits and tests;
- Documentation on the time and cause of demands on E/E/PE safety-related systems in actual operation the performance of the E/E/PE safety-related systems when subject to those demands, and any faults found during routine testing and maintenance;
- Documentation of any modifications made to safety-related ICS, including equipment under control (EUC).
2.3. Cybersecurity of IT Systems
- (a)
- Eliminate the security risk by design (avoiding vulnerabilities);
- (b)
- Mitigate the security risk by risk reduction measures (limiting vulnerabilities);
- (c)
- Provide information about residual security risks and measures to be adopted by the user.
- FR 1—Identification and authentication control (IAC);
- FR 2—Use control (UC);
- FR 3—System integrity (SI);
- FR 4—Data confidentiality (DC);
- FR 5—Restricted data flow (RDF);
- FR 6—Timely response to events (TRE);
- FR 7—Resource availability (RA).
2.4. Integrated Functional Safety and Cybersecurity Evaluation
- SL-T (target SAL)—Desired level of security;
- SL-C (capability SAL)—Security level that the device can provide when properly configured;
- SL-A (achieved SAL)—Actual level of security of a particular device.
2.5. Scope of BCM
- Identifying potential threats that might cause adverse impacts on an organization’s business operations, and associated risks;
- Providing a framework for building resilience for business operations;
- Providing capabilities, facilities, processes, and elaborated action task lists, etc., for effective responses to disasters and failures.
- (a)
- Identify risks of disruption to the organization’s prioritized activities and their supporting resources;
- (b)
- Systematically analyze and assess risks of disruption;
- (c)
- Evaluate risks of disruptions that require adequate treatment.
2.6. BCM in Energy Companies
- Failures in logistics chains, delays in delivery of raw materials or semi-finished products by business partners, and/or delays in providing services, spare parts etc.
- Failures in electric energy distributed systems
- Power transformer station failures fires, cyberattacks, etc.
- Physical or cyberattack
- Failures and outages of ICT and CT (cloud technology) systems and networks designed using wired and/or wireless technology
- Failures and outages of OT systems and networks, including production lines and storage, and/or malfunctions of industrial automation and control systems (IACS)
- Extreme environmental phenomena, lightning storms, heavy rain, local flooding, flood, hurricane, or tornado, extremely high or low temperature, and heavy snowfall or icing
- Disturbances in critical infrastructure objects and systems needed to deliver water, electricity, gas etc.
- Fire or explosion
- Extreme emission of pollutants and/or dangerous substances
- Destruction due to potentially critical events in physical surroundings or infrastructure installations
- Earthquake and/or tsunami (at sites close to the shore)
- Sabotage, terrorism, or cyberterrorism against critical infrastructure objects/systems inspired by an external principal or agent
- Legislative changes
- Key products and services are identified and protected, ensuring their continuity;
- Incident management capability is enabled to provide an effective response;
- The company understands its relationships with cooperating companies/organizations, relevant regulators and authorities, and emergency services;
- Staff are trained to respond effectively to an incident or disruption through appropriate exercises;
- Stakeholders’ requirements are understood and able to be delivered;
- Staff receive adequate support and communications in the event of a disruption;
- The company’s supply chain is better secured;
- The organization’s reputation is protected and remains compliant with its legal and regulatory obligations.
- Detection of all information security incidents (and weaknesses) and related escalation procedures and channels;
- Reporting and logging of all information security incidents and weaknesses;
- Logging all responses and preventive and corrective actions taken;
- Periodic evaluation of all information security incidents and weaknesses;
- Learning from reviews of information security incidents(and weaknesses and making improvements to security and to the information security incident and weakness management scheme.
- Resumption of product or service delivery after an incident, or resumption of a performance activity after an incident;
- Recovery of the ICT (information and communication technology) system or computer application after an incident, such as a hacker attack, or IT-OT system failure or functional abnormality, such as abnormal performance of the industrial automation and control system (IACS).
3. Proposed Integrated Functional Safety and Cybersecurity Evaluation in the Framework of BCM
- Formulating policies, goals, and domain, including legal and regulatory requirements and relevant standards and publications of good practice;
- Criteria for risk evaluation and reduction concerning dependability, safety, and security aspects, including domain key performance indicators (KPIs);
- Updated evidence, results of audits in design and plant operation, and results of modelling to support relevant decisions.
- Physical resilience and security of company resources and assets;
- Information and communication technology (ICT) resilience and security management over the whole life cycle;
- Adequate resilience and security of the industrial automation and control system (IACS) and supervisory control and data acquisition (SCADA) system in a specific industrial network/domain and required security assurance level (SAL) [26];
- Safety-related control systems designed and operated according to the functional safety concept with the required safety integrity level (SIL) [27];
- Industrial installations and processes with the required physical and functional protection measures;
- Infrastructure integrity for delivery of raw materials and energy (electricity, gas, oil) needed for production processes;
- Equipment reliability/availability adequately maintained according to the strategy developed to achieve, for instance, a satisfactory level of overall equipment effectiveness (OEE).
4. Case Study
4.1. Safety Aspects
4.2. Safety-Related ICS Aspects
4.3. Risk Treatment
4.4. Business Continuity Management Impact
4.5. Summary
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- SIEMENS Industrial Security. Available online: https://new.siemens.com/global/en/products/automation/topic-areas/industrial-security.html (accessed on 10 June 2021).
- Abdo, H.; Kaouk, M.; Flaus, J.M.; Masse, F. Safety and Security Risk Analysis Approach to Industrial Control Systems. Comput. Secur. 2018, 72, 175–195. [Google Scholar] [CrossRef] [Green Version]
- Li, S.W. Architecture Alignment and Interoperability, an Industrial Internet Consortium and Platform Industry 4.0. Available online: https://www.iiconsortium.org/pdf/JTG2_Whitepaper_final_20171205.pdf (accessed on 10 June 2021).
- ISO/DIS 22301; Security and Resilience—Business Continuity Management Systems—Requirements. International Organization for Standardization: Geneva, Switzerland, 2019.
- Xing, J.; Zio, E. An Integrated Framework for Business Continuity Management of Critical Infrastructures; CRC Press: Boca Raton, FL, USA, 2016; pp. 563–570. [Google Scholar]
- Lundteigen, M.A.; Rausand, M.; Utne, I.B. Integrating RAMS engineering and management with the safety life cycle of IEC 61508. Reliab. Eng. Syst. Saf. 2009, 94, 1894–1903. [Google Scholar] [CrossRef]
- Saraswat, S.; Yadava, G.S. An overview on reliability, availability, maintainability and supportability (RAMS) engineering. Int. J. Qual. Reliab. Manag. 2008, 25, 330–344. [Google Scholar] [CrossRef]
- Misra, K.B. (Ed.) Handbook of Advanced Performability Engineering; Springer Nature: Cham, Switzerland, 2021. [Google Scholar]
- Niemimaa, M. Interdisciplinary Review of Business Continuity from an Information Systems Perspective: Toward an Integrative Framework. Commun. Assoc. Inf. Syst. 2015, 37, 4. [Google Scholar] [CrossRef]
- Gołębiewski, D.; Kosmowski, K. Towards Process-Based Management System for Oil Port Infrastructure in Context of Insurance. J. Pol. Saf. Reliab. Assoc. 2017, 8, 23–37. [Google Scholar]
- Kosmowski, K.T.; Gołębiewski, D. Functional Safety and Cyber Security Analysis for Life Cycle Management of Industrial Control Systems in Hazardous Plants and Oil Port Critical Infrastructure Including Insurance. J. Pol. Saf. Reliab. Assoc. 2019, 10, 99–126. [Google Scholar]
- Kosmowski, K.T. Systems engineering approach to functional safety and cyber security of industrial critical installations. In Safety and Reliability of Systems and Processes; Kołowrocki, K., Bogalecka, M., Dąbrowska, E., Torbicki, M., Eds.; Gdynia Maritime University: Gdynia, Poland, 2020; pp. 135–151. [Google Scholar]
- Systems Engineering Fundamentals; Defense Acquisition University Press: Fort Belvoir, VA, USA, 2001.
- Białas, A. Semiformal Common Criteria Compliant IT Security Development Framework; Studia Informatica; Silesian University of Technology Press: Gliwice, Poland, 2008. [Google Scholar]
- Kriaa, S.; Pietre-Cambacedes, L.; Bouissou, M.; Halgand, Y. Approaches Combining Safety and Security for Industrial Control Systems. Reliab. Eng. Syst. Saf. 2015, 139, 156–178. [Google Scholar] [CrossRef]
- CISA Assessments: Cyber Resilience Review. Available online: https://www.cisa.gov/uscert/resources/assessments (accessed on 10 February 2020).
- Leitão, P.; Colombo, A.W.; Karnouskos, S. Industrial Automation Based on Cyber-Physical Systems Technologies: Prototype Implementations and Challenges. Comput. Ind. 2016, 81, 11–25. [Google Scholar] [CrossRef] [Green Version]
- MERGE. Safety & Security, Recommendations for Security and Safety Co-Engineering, Multi-Concerns Interactions System Engineering. ITEA2 Project No. 11011. Available online: https://itea4.org/project/workpackage/document/download/2837/D3.4.4.%20MERgE%20-%20Recommendations%20for%20Security%20and%20Safety%20Co-engineering%20v3%20partA.pdf (accessed on 1 June 2021).
- Integrated Design and Evaluation Methodology. Security and Safety Modelling; Artemis JU Grant Agr., No. 2295354. Available online: http://sesamo-project.eu/sites/default/files/downloads/publications/integrated-design-and-evaluation-communication-material.pdf (accessed on 5 June 2018).
- Boehmer, W.J. Survivability and business continuity management system according to BS 25999. In Proceedings of the IEEE 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Greece, 18–23 June 2009; Volume 1, pp. 142–147. [Google Scholar]
- Zawiła-Niedźwiecki, J. Operational Risk Management in Assuring Organization Operational Continuity; Edu-Libri.: Kraków, Poland, 2013. (In Polish) [Google Scholar]
- Cyber Security for Industrial Automation and Control Systems, Health and Safety Executive (HSE) Interpretation of Current Standards on Industrial Communication Network and System Security, and Functional Safety 2015. Available online: https://www.hse.gov.uk/foi/internalops/og/og-0086.pdf (accessed on 5 May 2021).
- Kosmowski, K.T. Functional safety and cybersecurity analysis and management in smart manufacturing systems. In Handbook of Advanced Performability Engineering; Krishna, B.M., Ed.; Springer Nature: Cham, Switzerland, 2021. [Google Scholar]
- Kościelny, J.M.; Syfert, M.; Fajdek, B. Modern Measures of Risk Reduction in Industrial Processes. J. Autom. Mob. Robot. Intell. Syst. 2019, 1, 20–29. [Google Scholar] [CrossRef]
- Kosmowski, K.T. Functional Safety and Reliability Analysis Methodology for Hazardous Industrial Plants; Gdansk University of Technology Publishers: Gdańsk, Poland, 2013. [Google Scholar]
- IEC 62443; Security for Industrial Automation and Control Systems. Parts 1–14 (Some Parts in Preparation). The International Electrotechnical Commission: Geneva, Switzerland, 2018.
- IEC 61508; Functional Safety of Electrical/ Electronic/ Programmable Electronic Safety-Related Systems, Parts 1–7. The International Electrotechnical Commission: Geneva, Switzerland, 2016.
- Gabriel, A.; Ozansoy, C.; Shi, J. Developments in SIL Determination and Calculation. Reliab. Eng. Syst. Saf. 2018, 177, 148–161. [Google Scholar] [CrossRef]
- BS 25999-1; Business Continuity Management—Part 1: Code of Practice. British Standard Institution: London, UK, 2006.
- SP 800-82r2; Guide to Industrial Control Systems (ICS) Security. NIST: Gaithersburg, MD, USA, 2015.
- ETSI TS 102 165-1; CYBER Methods and Protocols. Part 1: Method and pro Forma for Threat, Vulnerability, Risk Analysis (TVRA). Technical Specs; ETSI: Sophia Anthipolis, France, 2017.
- Kosmowski, K.T.; Śliwiński, M. Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports. J. Pol. Saf. Reliab. Assoc. 2016, 7, 133–146. [Google Scholar]
- ISA. Security of Industrial Automation and Control Systems, Quick Start Guide: An Overview of ISA/IEC 62443 Standards; ISA—International Society of Automation: Alexander, NC, USA, 2020. [Google Scholar]
- Saleh, J.H.; Cummings, A.M. Safety in the Mining Industry and the Unfinished Legacy of Mining Accidents. Saf. Sci. 2011, 49, 764–777. [Google Scholar] [CrossRef]
- Subramanian, N.; Zalewski, J. Quantitative Assessment of Safety and Security of System Architectures for Cyberphysical Systems Using NFR Approach. IEEE Syst. J. 2016, 2, 397–409. [Google Scholar] [CrossRef]
- IEC 61511; Safety Instrumented Systems for the Process Industry Sector. Parts 1–3. The International Electrotechnical Commission: Geneva, Switzerland, 2016.
- Holstein, D.K.; Singer, B. Quantitative Security Measures for Cyber & Safety Security Assurance; ISA: Alexander, NC, USA, 2010. [Google Scholar]
- Śliwiński, M.; Piesik, E.; Piesik, J. Integrated Functional Safety and Cybersecurity Analysis. IFAC Pap. OnLine 2018, 51, 1263–1270. [Google Scholar] [CrossRef]
- IEC 62061; Safety of Machinery—Functional Safety of Safety-Related Electrical, Electronic, and Programmable Electronic Control Systems. The International Electrotechnical Commission: Geneva, Switzerland, 2018.
- Kosmowski, K.T.; Śliwiński, M.; Piesik, J. Integrated Functional Safety and Cybersecurity Analysis Method for Smart Manufacturing Systems. TASK Q. 2019, 23, 1–31. [Google Scholar]
- IEC 63074; Security Aspects Related to Functional Safety of Safety-Related Control Systems. The International Electrotechnical Commission: Geneva, Switzerland, 2017.
- Braband, J. What’s security level got to do with safety integrity level? In Proceedings of the 8th European Congress on Embedded Real Time Software and Systems, Toulouse, France, 27–29 January 2016. [Google Scholar]
- Kosmowski, K.T. Safety integrity verification issues of the control systems for industrial power plants. In Proceedings of the International Conference on Diagnostics of Processes and Systems, Sandomierz, Poland, 11–13 September 2017; pp. 420–433. [Google Scholar]
- ISO/IEC 24762; Information Technology—Security Techniques—Guidelines for Information and Communications Technology Disaster Recovery Services. International Organization for Standardization: Geneva, Switzerland, 2008.
- ISO/DTR 22100; Safety of Machinery—Guidance to Machinery Manufacturers for Consideration of Related IT Security (Cyber Security) Aspects. International Organization for Standardization: Geneva, Switzerland, 2018.
- IEC TR 63074; Safety of Machinery—Security Aspects to Functional Safety of Safety-Related Control Systems. The International Electrotechnical Commission: Geneva, Switzerland, 2019.
- ISO/IEC 27005; Information Technology—Security Techniques—Information Security Risk Management. International Organization for Standardization: Geneva, Switzerland, 2018.
- BSI-Standard 100-4; Business Continuity Management. Federal Office for Information Security (BSI): Berlin, Germany, 2009.
- ISO/PAS 22399; Societal Security—Guideline for Incident Preparedness and Operational Continuity Management. International Organization for Standardization: Geneva, Switzerland, 2007.
- ISO/IEC 27031; Information Technology—Security Techniques—Guidelines for Information and Communication Technology Readiness for Business Continuity. International Organization for Standardization: Geneva, Switzerland, 2011.
- Kanamaru, H. Bridging functional safety and cyber security of SIS/SCS. In Proceedings of the IEEE 56th Annual Conference of the Society of Instrument and Control Engineers of Japan, Kanazawa, Japan, 19–22 September 2017. [Google Scholar]
- Smith, D.J. Reliability, Maintainability and Risk. Practical Methods for Engineers, 9th ed.; Butterworth-Heinemann: Oxford, UK, 2017. [Google Scholar]
- Piesik, E.; Śliwiński, M.; Barnert, T. Determining the Safety Integrity Level of Systems with Security Aspects. Reliab. Eng. Syst. Saf. 2016, 152, 259–272. [Google Scholar] [CrossRef]
- Kosmowski, K.T.; Śliwiński, M. Knowledge-Based Functional Safety and Security Management in Hazardous Industrial Plants with Emphasis on Human Factors; Advanced Control and Diagnostic Systems; PWNT: Gdańsk, Poland, 2015. [Google Scholar]
- Felser, M.; Rentschler, M.; Kleinberg, O. Coexistence standardisation of operational technology and information technology. Proc. IEEE 2019, 104, 962–976. [Google Scholar] [CrossRef]
- Rogala, I.; Kosmowski, K.T. Audit Document Concerning Organizational and Technical Aspects of the Safety-Related Control System Design and Operation at a Refinery (Access Restricted); Automatic Systems Engineering, Gdańsk and Gdańsk University of Technology: Gdańsk, Poland, 2012. [Google Scholar]
SIL | PFDavg | PFH [h−1] |
---|---|---|
4 | [10−5, 10−4) | [10−9, 10−8) |
3 | [10−4, 10−3) | [10−8, 10−7) |
2 | [10−3, 10−2) | [10−7, 10−6) |
1 | [10−2, 10−1) | [10−6, 10−5) |
Security Levels | Description |
---|---|
SL 1 | Protection against casual or coincidental violation |
SL 2 | Protection against intentional violation using simple means with low resources, generic skills, and low motivation |
SL 3 | Protection against intentional violation using sophisticated means with moderate resources, IACS-specific skills, and moderate motivation |
SL 4 | Protection against intentional violation using sophisticated means with extended resources, IACS-specific skills, and high motivation |
Security Indicator SIDo/SAL | SIL Verified According to IEC 61508 * | |||
---|---|---|---|---|
1 | 2 | 3 | 4 | |
SIDo1∈[1.0, 1.5)/SAL 1 | SIL 1 | SIL 1 | SIL 1 | SIL 1 |
SIDo2∈[1.5, 2.5)/SAL 2 | SIL 1 | SIL 2 | SIL 2 | SIL 2 |
SIDo3∈[2.5, 3.5)/SAL 3 | SIL 1 | SIL 2 | SIL 3 | SIL 3 |
SIDo4∈[3.5, 4.0]/SAL 4 | SIL 1 | SIL 2 | SIL 3 | SIL 4 |
Subsystem | SIL | PFDavg |
---|---|---|
A. Input subsystem | SIL 4 | 3.1 × 10−5 |
Pressure transmitter | ||
Analog Input Card | ||
B. Logic subsystem | SIL 4 | 3.5 × 10−5 |
Safety PLC | ||
C. Output subsystem | SIL 4 | 4.6 × 10−5 |
Digital Output Card | ||
Solenoid valve | ||
Globe valve & | ||
Pneumatic Actuator |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kosmowski, K.T.; Piesik, E.; Piesik, J.; Śliwiński, M. Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies 2022, 15, 3610. https://doi.org/10.3390/en15103610
Kosmowski KT, Piesik E, Piesik J, Śliwiński M. Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies. 2022; 15(10):3610. https://doi.org/10.3390/en15103610
Chicago/Turabian StyleKosmowski, Kazimierz T., Emilian Piesik, Jan Piesik, and Marcin Śliwiński. 2022. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management" Energies 15, no. 10: 3610. https://doi.org/10.3390/en15103610
APA StyleKosmowski, K. T., Piesik, E., Piesik, J., & Śliwiński, M. (2022). Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies, 15(10), 3610. https://doi.org/10.3390/en15103610