Cybersecurity Requirements for Industrial Machine Control Systems
Abstract
:1. Introduction
- Halting production or reducing production;
- Loss of quality of manufactured workpieces, which may not be easy to detect quickly and exposes the company to financial losses;
- Loss of data—encryption by blackmailers demanding ransom;
- Falsification of documentation and the introduction of chaos in various departments of the company;
- Emission of hazardous substances into the environment—contamination of the environment and danger to local residents or the wider area;
- Loss of safety functions in machine control systems, which can directly expose employees to mechanical hazards, hazards associated with the emission of hazardous substances, and many others.
- Rules for creating passwords for newly acquired PLCs/microcontrollers/machine computers;
- How often they should be changed (e.g., due to employee turnover);
- Where they should be stored (on the local computer’s disc/on the network on a server, whether in encrypted form; consider that such a computer can also be attacked, resulting in the loss of stored passwords; another solution is to store passwords written on paper);
- Who should have access to stored passwords;
- Rules for supervising compliance with the policy (checking that passwords are not written, for example, with a marker on the controller or on the door of the control cabinet or on electrical diagrams, etc.).
- Encrypted connections required;
- Access only within a certain pool of IP addresses;
- Degree of password complexity;
- Temporary access rather than unlimited time;
- Read-only connection, if sufficient;
- Generation of a post-intervention checksum;
- Recording the date, time, and personal data of the modifier.
2. Analysis of Cyber Threats in the Industry
3. Machine Safety Requirements
3.1. Risk Assessment and Reduction
- Defining machine limitations;
- Identifying hazards (e.g., mechanical, electrical, security threats);
- Risk estimation.
3.2. Safety Functions
3.2.1. Determination of the Required Level of Safety Integrity
- The severity of the injury (S);
- The frequency of exposure and/or its duration (F);
- The possibility of avoiding or limiting harm (P).
3.2.2. Achieved PLs and SILs
- The architecture of the system (categories B, 1, 2, 3, 4);
- The value of the mean time to dangerous failure (MTTFd);
- Diagnostic coverage (DC);
- Common cause failure tolerance (CCF).
3.2.3. System Architecture—Categories
4. Relationship Between Safety Categories and PLs and Security Levels
- SL 1—protection against casual or coincidental violation.
- SL 2—protection against intentional violation using simple means with low resources, generic skills, and low motivation.
- SL 3—protection against intentional violation using sophisticated means with moderate resources, IACS-specific skills, and moderate motivation.
- SL 4—protection against intentional violation using sophisticated means with extended resources, IACS-specific skills, and high motivation.
- Target, SL-T (required);
- Capability, SL-C;
- Achieved, SL-A.
- -
- Developing a clear understanding of the system’s architecture, vulnerabilities, and potential attack vectors across all levels, from local devices to cloud-based services.
- -
- Implementing synchronized protocols for real-time threat detection and response. This ensures that actions taken at one level (e.g., local control) align with strategies at higher levels (e.g., enterprise management).
- -
- Securing both the physical and virtual components of the system. This includes robust firewalls, encryption methods, and redundancy measures to prevent unauthorized access and ensure data integrity in the network of data exchange.
- -
- Recognizing the human factor in system security, such as errors in judgement, fatigue, or lack of training and mitigating these risks through regular training programmes, ergonomic interfaces, and automated alerts to support decision-making processes.
5. Case Study—Examples of Determining SLs of Safety Functions Implemented in Machine Safety Systems
5.1. Example 1—Machine Control System: Category B, PLa; Cybersecurity SL-T 0
5.2. Example 2—Machine Control System: Category B, PLb; Cybersecurity SL-T 1
5.3. Example 3—Machine Control System: Category 1, PLc; Cybersecurity SL-T 0
5.4. Example 4—Machine Control System: Category 2, PLc; Cybersecurity SL-T 2
5.5. Example 5—Machine Control System: Category 2, PLd; Cybersecurity SL-T 3
5.6. Example 6—Machine Control System: Category 3, PLd; Cybersecurity SL-T 3
5.7. Example 7—Machine Control System: Category 4, PLe; Cybersecurity SL-T 3
6. Summary and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Stallings, W. Network Security Essentials: Applications and Standards; Pearson: Boston, MA, USA, 2020. [Google Scholar]
- Tanveer, A.; Sinha, R.; MacDonell, S.G.; Leitao, P.; Vyatkin, V. Designing Actively Secure, Highly Available Industrial Automation Applications. arXiv 2021, arXiv:2101.01856. [Google Scholar]
- Lesi, V.; Jakovljevic, Z.; Pajic, M. Security Analysis for Distributed IoT-Based Industrial Automation. arXiv 2020, arXiv:2006.00044. Available online: https://arxiv.org/abs/2006.00044 (accessed on 25 September 2024). [CrossRef]
- Duque Anton, S.D.; Fraunholz, D.; Krohmer, D.; Reti, D.; Schneider, D.; Schotten, H.D. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World. arXiv 2021, arXiv:2111.13862. Available online: https://arxiv.org/abs/2111.13862 (accessed on 25 September 2024).
- Buczkowski, P.; Malacaria, P.; Hankin, C.; Fielder, A. Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using the CySecTool Tool. arXiv 2022, arXiv:2204.11707. Available online: https://arxiv.org/abs/2204.11707 (accessed on 20 September 2024).
- Boyes, W. Instrumentation Reference Book; Butterworth-Heinemann: Oxford, UK, 2010; Available online: https://www.sciencedirect.com/science/article/pii/B9780750683081000577 (accessed on 25 September 2024).
- Mesarovic, M.D.; Takahara, Y. Theory of Multi-Level Hierarchical Systems; Academic Press: New York, NY, USA, 1970. [Google Scholar]
- Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 2011, 14, 1–33. [Google Scholar] [CrossRef]
- Slay, J.; Miller, M. Lessons Learned from the Maroochy Water Breach. In International Conference on Critical Infrastructure Protection; Springer: Boston, MA, USA, 2007; pp. 73–82. [Google Scholar] [CrossRef]
- Chen, L.; Löhr, H.; Manulis, M.; Sadeghi, A.R. Property-Based Attestation without a Trusted Third Party. Inf. Secur. Conf. ISC 2008, 5222, 277–284. [Google Scholar]
- Gajek, S.; Manulis, M.; Pereira, O.; Sadeghi, A.R.; Schwenk, J. Universally Composable Security Analysis of TLS. In Provable Security. ProvSec 2008; Baek, J., Bao, F., Chen, K., Lai, X., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5324. [Google Scholar] [CrossRef]
- Manowska, A.; Boros, M.; Hassan, M.W.; Bluszcz, A.; Tobór-Osadnik, K. A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data. Electronics 2024, 13, 2849. [Google Scholar] [CrossRef]
- Cutillo, L.A.; Mark, M.; Thorsten, S. Security and Privacy in Online Social Networks. Handbook of Social Network Technologies. 2010. Available online: https://api.semanticscholar.org/CorpusID:19873542 (accessed on 23 January 2025).
- Śliwiński, M.; Piesik, E. Designing control and protection systems with regard to integrated functional safety and cybersecurity aspects. Energies 2021, 14, 2227. [Google Scholar] [CrossRef]
- Kasprzyczak, L. Common errors in machine safety-related control systems and methods of their elimination. J. KONBiN 2023, 53, 141–151. [Google Scholar] [CrossRef]
- Regulation (EU) 2023/1230 of the European Parliament and of the Council of 14 June 2023 on machinery and repealing Directive 2006/42/EC of the European Parliament and of the Council and Council Directive 73/361/EEC. Available online: https://eur-lex.europa.eu/eli/reg/2023/1230/oj/eng (accessed on 23 January 2025).
- ISO 12100:2010; Safety of Machinery. General Principles for Design. Risk Assessment and Risk Reduction. ISO: Geneva, Switzerland, 2010.
- ISO 13849-1:2023; Safety of Machinery. Safety-Related Parts of Control Systems—General Principles for Design. ISO: Geneva, Switzerland, 2023.
- IEC 62061:2021+A1:2024; Safety of Machinery. Functional Safety of Safety-Related Control Systems. IEC: Geneva, Switzerland, 2024.
- Dźwiarek, M.; Hryniewicz, O. Periodical inspection frequency of safety related control systems of machinery—Practical recommendations for the determination. In Advances in Safety, Reliability and Risk Management; Grall, B., Soares, G., Eds.; Taylor & Francis Group: London, UK, 2011; pp. 495–502. ISBN 978-0-415-68379-1. [Google Scholar]
- ISO/IEC 27001:2022; Information security, cybersecurity and privacy protection—Information security management systems—Requirements. ISO: Geneva, Switzerland, 2022.
- IEC TS 62443-1-1:2009; Industrial communication networks - Network and system security—Part 1-1: Terminology, Concepts and Models. IEC: Geneva, Switzerland, 2009.
- IEC 62443-4-2:2019; Industrial Communication Networks—Network and System Security—Part 1-1: Terminology, Concepts and Models. IEC: Geneva, Switzerland, 2019.
- IEC 62443-3-2:2020; Security for Industrial Automation And Control Systems—Part 3-2: Security Risk Assessment for System Design. IEC: Geneva, Switzerland, 2020.
- ISO 13849-2:2012; Safety of Machinery—Safety-Related Parts of Control Systems Part 2: Validation. ISO: Geneva, Switzerland, 2012.
- IEC 61496-1:2020; Safety of Machinery—Electro-Sensitive Protective Equipment—Part 1: General Requirements and Tests. IEC: Geneva, Switzerland, 2020.
- ISO 13850:2015; Safety of Machinery—Emergency Stop Function—Principles for Design. ISO: Geneva, Switzerland, 2015.
- ISO 10218-2:2011; Robots and Robotic Devices—Safety Requirements for Industrial Robots Part 2: Robot Systems and Integration. ISO: Geneva, Switzerland, 2011.
- ISO 16092-3:2017; Machine Tools Safety—Presses Part 3: Safety Requirements for Hydraulic Presses. ISO: Geneva, Switzerland, 2017.
PFHd | SIL | PL |
---|---|---|
≥10−5 to <10−4 | - | a |
≥3 × 10−6 to <10−5 | 1 | b |
≥10−6 to <3 × 10−6 | 1 | c |
≥10−7 to <10−6 | 2 | d |
≥10−8 to <10−7 | 3 | e |
Category | Features | |||
---|---|---|---|---|
B | Use of elements that comply with standards and basic safety principles, withstanding expected exposures. Occurrence of failure may result in loss of safety function (single-channel system) | |||
1 | As in B, well-tried components and well-tried safety principles are used. The occurrence of a failure may cause a loss of safety function, but the probability of this is lower than in category B (single-channel system) | well-tried safety principles | ||
2 | As in B, well-tried safety principles are used. The safety function is checked by the control system. The occurrence of a fault may cause the loss of the safety function between checks (single-channel system) | Failures detection | ||
3 | As in B, well-tried safety principles are applied. The two-channel structure is tolerant to a single fault. Low-to-medium diagnostic coverage of 60 to 99% | Redundancy | ||
4 | As in B, well-tried safety principles are applied. The two-channel structure is tolerant of single failure or cumulative failures. High diagnostic coverage ≥99% |
SL | Qualitative Description |
---|---|
1 | Low |
2 | Medium |
3 | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kasprzyczak, L.; Manowska, A.; Dźwiarek, M. Cybersecurity Requirements for Industrial Machine Control Systems. Appl. Sci. 2025, 15, 1267. https://doi.org/10.3390/app15031267
Kasprzyczak L, Manowska A, Dźwiarek M. Cybersecurity Requirements for Industrial Machine Control Systems. Applied Sciences. 2025; 15(3):1267. https://doi.org/10.3390/app15031267
Chicago/Turabian StyleKasprzyczak, Leszek, Anna Manowska, and Marek Dźwiarek. 2025. "Cybersecurity Requirements for Industrial Machine Control Systems" Applied Sciences 15, no. 3: 1267. https://doi.org/10.3390/app15031267
APA StyleKasprzyczak, L., Manowska, A., & Dźwiarek, M. (2025). Cybersecurity Requirements for Industrial Machine Control Systems. Applied Sciences, 15(3), 1267. https://doi.org/10.3390/app15031267