DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Cybersecurity Preparedness for Oil, Gas and Petrochemical Operations

From:automation | Author:H | Time :2024-11-27 | 222 Browse: | Share:

Cybersecurity Preparedness for Oil, Gas and Petrochemical Operations

Industrial companies often pride themselves on their safety culture, but few have elevated or advanced cybersecurity activities to a similar level of visibility and prestige. Stuxnet, the first known cyberweapon, hit industrial control systems in the 2010s and, in the dozen years since, information technology (IT) professionals and industrial automation and control system (IACS) experts have worked to protect operational technology (OT) and business systems from similar threats. Unfortunately, cyber threats keep evolving, IT and OT efforts are often unaligned, and many industrial companies struggle to achieve what might be called cybersecurity maturity.

Help is available from the International Society of Automation (ISA) in multiple forms. This article highlights resources available from ISA and the ISA Global Cybersecurity Alliance (ISAGCA) including the ISA/ IEC 624443 Series standards and online cybersecurity training, and reports on some research from ISA’s news and publications subsidiary, Automation.com. It also reveals how Malaysia’s national oil and gas company, PETRONAS, is building “institutionalized capability” in OT cybersecurity to become one of the world’s most cyber mature organizations.

Increasingly frequent and often high-profile attacks like the Colonial Pipeline incident in the U.S., as well as new government regulations around the world, have spurred industrial companies to improve cybersecurity. But studies by McKinsey & Co., Gartner and others reveal that companies fall into a range of maturity levels when it comes to cybersecurity preparedness and protections.

Companies in the energy sector—including oil & gas, electric power generation, coal, renewable energy, and related systems and services—have been the most frequent target of OT cyberattacks in recent years, so it’s not surprising to find a lot of cybersecurity interest and awareness in those companies. Automation.com conducted a survey in May 2023, sponsored by Fortinet, of OT professionals in oil and gas and petrochemical companies to ask about their OT cybersecurity actions and perceptions.

Slightly more than half of respondents believe their companies are on par or above average compared to industry peers when it comes to securing OT systems. These companies seemed more mature in their cybersecurity posture, having completed all or most recommended tasks. The other half of respondents were notably less mature, with plans but little implemented so far.

The survey revealed that some of the concerns of process control engineers and other automation professionals were:

  • The increasing risk of cyberattacks on OT systems including supervisory control and data acquisition (SCADA), industrial control, and pipeline control. Recent high-profile attacks have highlighted vulnerabilities.

  • The rapid evolution cyber threats, which require continued vigilance and adaptation from companies to detect and mitigate new attack vectors.

  • Safety risks, including environmental incidents or harm to human health/safety, resulting from successful cyberattacks that disrupt industrial processes and plant operations.

  • Shortage of skilled workers to properly secure systems, detect threats, and respond to incidents.

  • Insufficient collaboration between IT and OT teams within organizations to ensure integrated security policies, technology, monitoring and response.

The report suggests OT cybersecurity be made an organization-wide priority, with strong leadership, governance, training, and technological protections put in place to create robust, secure operational environments.


ISA/IEC 62443 standards

Insufficient collaboration between IT and OT teams can result in a lack of alignment between the two groups’ assumptions, procedures, and motivations about cybersecurity. The hardware and software technology used by each group can be similar, but how they are used is often very different. The convergence of IT and OT security ends up being as challenging as the integration of the systems themselves.

Seeing the need for OT-specific cybersecurity action and advocacy, ISA created the ISA Global Cybersecurity Alliance (ISAGCA) in 2020. At the time, Andre Ristaino, managing director of Global Consortia and Conformity Assessment for ISA said, “The operational technologies and control systems that automate critical infrastructure are experiencing a rapid increase in malicious cybersecurity attacks that include data breaches and ransomware. The impact is serious, affecting life, safety, environmental protection and economic viability across sectors. ISAGCA is driving alignment and clarity across public and private sectors.”

The foundation of ISAGCA’s work is ISA/IEC 62443, a series of ISA-developed, consensusbased security standards for automation and control system applications. The ISA/IEC 62443 series of standards address all entities involved in the protection of operating facilities (Figure 1). Various stakeholders—including industrial product designers, system integrators, service providers, and asset owners—leverage ISA/IEC 62443 Series standards to create secure products and systems, conduct risk assessments and much more.

Figure 1: The ISA/IEC 62443 series of standards addresses all entities involved in the protection of operating facilities. Visit ISA.org for the most up-to-date information. Source: ISA

“The series approaches the cybersecurity challenge in a holistic way, bridging the gap between operations and information technology, and between process safety and cybersecurity,” said Ristano.

According to an ISAGCA whitepaper, “Many organizations (especially very large ones) have established policies and procedures governing the IT security in their office environment; many of these are based on ISO/IEC 27001/2 [27001] [27002]. Some have attempted to address their operational technology (OT) infrastructure under the same management system and have leveraged many IT/OT commonalities.

“Although it would be ideal to always select common controls and implementations for both IT and OT, organizations have been confronted with challenges in doing so: the locking of an OT operator screen creating unsafe conditions, antivirus products incompatible with OT equipment, patching practices disrupting production schedules, or network traffic from routine backups blocking safety control messages. The ISA/IEC 62443 Series standards explicitly address issues such as these; this helps an organization to maintain conformance with ISO/IEC 27001 through common approaches wherever feasible, while highlighting differences in IT versus OT approach where needed.”

The whitepaper offers guidance for organizations familiar with ISO/IEC 27001 and interested in protecting the OT infrastructure of their operating facilities based on the ISA/ IEC 62443 series. It describes the relationship between the ISA/IEC 62443 series and ISO/ IEC 27001/2 and how both standards may be effectively used within one organization to protect both IT and OT.



PETRONAS leverages ISA/IEC 62443

PETRONAS, Malaysia’s national oil and gas company, is a dynamic global energy group with presence in more than 100 countries. According to Sharul A. Rashid, PETRONAS GTS head of technical excellence and group technical authority for instrumentation and control, the enterprise-wide cybersecurity program for PETRONAS started in 2018.

“A five-year roadmap toward building an institutionalized capability in OT cybersecurity was crafted and subsequently approved in 2019,” said Rashid. “The institutionalized capability-building program was established mainly to create a culture of cybersecurity and to ensure the ongoing suitability and competence of personnel commensurate with the risk to critical infrastructure. The organizational objectives were: responsibilities; workforce controls; knowledge, skills and abilities; and awareness.

At that time, the task force consisted of Sharul, principal instrument and control (I & C) engineers Azmi Hashim and Michael Ng Chien Han, and senior I & C engineer Ping Yang. All four men helped shape and steer the PETRONAS OT cybersecurity program.

In November 2020, PETRONAS became a founding member of ISAGCA. By February 2021, it started attending ISAGCA Government Relations—Asia Pacific meetings. “We learned that ISAGCA aspired to designate and reference the ISA/IEC 62443 standard in a country’s law and regulatory policy. So, for Malaysia, we started our efforts to support that,” said Rashid.

OT Risk Management for PETRONAS is based on the ISA/IEC 624443-3-2 Standard, said Ng Chien Han. “Cyber risk of an OT system is established by evaluating the business impact of that system, if it is compromised, and the likelihood of that compromise happening. Business impact is evaluated from the lens of how it affects people, environment and assets, as well as the company’s reputation. The likelihood is established via control compliance in addressing threats from a cyber security threat register,” he explained.

In September 2023, “PETRONAS reached a milestone by—for the first time—executing a cybersecurity risk assessment as part of the engineering design stage of a capital project,” Rashid added. “Through the risk assessment, the Security Level Target (SLT) of each OT system of the project was established. This exercise provided the EPCC (Engineering, Procurement, Construction, and Commissioning), OT, and OT vendors with detailed security specifications for the systems being designed. The specifications to be delivered are from the ISA/IEC 62443-3-3 system security requirements and security levels standard in addition to the PETRONAS technical standards,” he explained.

PETRONAS has made good use of the wide range of cybersecurity resources that ISA offers (see sidebar). “Utilizing the ISA/ IEC 62443 standards in engineering design has helped advance cybersecurity discussions with the OT vendors in delivering secured-by-design OT systems. It has also helped PETRONAS as a tool to strengthen the cybersecurity awareness and practices of its partners and collaborators,” said Rashid.

ISA offers multiple levels of OT cybersecurity training courses. Students who complete the courses and associate exams can earn certificates that demonstrate their growing cybersecurity maturity. Source: ISAGCA.


Role of training and certification

Facing increasing threats of cyber-attacks, PETRONAS sought to better train its staff. “We realized that both IT and OT personnel must work together, and we applied an IT-OT convergence strategy in action,” said Rashid. “We quickly built up and nurtured our best performing team in this area as a high-level, IT-OT converged cybersecurity taskforce, guided by the ISA/IEC 62443 standards’ sustainable, international best practices. As part of this program, competency and capability building was one of our primary agenda points,” he explained.

As part of the competency goals, PETRONAS decided that all cybersecurity task force members would be trained. The team reviewed available OT cybersecurity trainings and chose ISA online certificate courses including Cybersecurity Fundamental, Risk, Design and Maintenance courses and passed four certificate exams to earn ISA/IEC62443 Expert Certificates.

PETRONAS added other trainings, such as the PETRONAS cybersecurity project for OT, short trainings on human defense/ firewall, and more. New IT personnel “attend onboarding programs to ensure that they understand very well the criticality and priority of the OT environment. We are also extending the awareness training to the frontline, such as panel operators and boardmen who are monitoring and controlling OT assets via distributed control systems (DCS) 24/7, 365 days a year,” he said.

More than 1,000 manhours were spent conducting awareness training. “Combining ISA trainings with other relevant trainings, I believe that PETRONAS is moving forward in the right direction toward our goal of enhancing our cybersecurity culture,” said Rashid.

With the staff trained in ISA/IEC 62443, Rashid said PETRONAS personnel are “able to communicate our cybersecurity goals more effectively to our stakeholders and vendors. Knowledge in the standards have also helped us shape the cybersecurity governance framework of our organization.”


Addressing vulnerabilities, supporting staff

In general, OT cybersecurity incident reporting reveals more unauthorized attempts and a marked increase in malicious code attacks. Rashid believes OT systems will be subject to the same vulnerabilities as IT systems, especially as industrial control systems employ more commercial off-the-shelf (COTS) hardware and software with more embedded IT technology such as MS Windows operating system, Ethernet IP-based communication, and virtualization such as VMWare and Hypervisor.

“Common cyber incidences include blue screens, denial of service (DOS), and unauthorized remote access. Therefore, aggressive education, training, visual management, audits, and the courage to give feedback to staff on cybersecurity malpractices is surely needed,” said Rashid. Rashid and Hasim published a case history article showing some of the “aggressive education,” training, and visual management tools PETRONAS used to create the cybersecurity culture they wanted. See the ISAGCA blog titled, “Accelerating Cybersecurity Culture Maturity in the Workplace.

“Today, an established, experienced and matured cybersecurity team is collaboratively working as a fully converged IT-OT enterprise level entity. Core to sustaining PETRONAS’ cybersecurity maturity ambitions was the establishment of a cyber risk management framework. In this regard, PETRONAS has developed a standardized cybersecurity risk management program to cover both IT and OT domains,” said Rashid.

“As part of an accelerated cybersecurity culture at the workplace, one must engage staff, conduct awareness training, and foster an understanding that becoming inactive and uneducated on cybersecurity risk management can lead to a major loss of business,” said Rashid. “In leading the OT Cybersecurity team at PETRONAS, we engage and support staff as much as possible. We build and nurture our best performing teams with our new cybersecurity taskforce, as well as guide them using international standards and best practices on sustainable, pragmatic approaches."


ISASecure and other OT cybersecurity work ISA is doing

Industrial automation and control system cybersecurity, also known as operational technology or OT cybersecurity, is one of the most critical issues facing manufacturing and industrial companies around the world today.

The International Society of Automation plays a key role in helping to protect people, operating sites, products, and systems through its wide range of resources built on the ISA/IEC 62443 series of standards.

As Andre Ristaino, managing director of Global Consortia and Conformity Assessment for ISA explains, “ISA is addressing multiple dimensions of the challenge and seeking to elevate OT cybersecurity from an art to a science and ultimately to an engineering discipline.”

While the ISA Education department trains and certifies personnel on the OT cybersecurity topics, for example, the ISASecure program certifies commercial off-the-shelf (COTS) devices and systems to the ISA/IEC 62443 series of standards. This makes it easier for asset-owner companies like PETRONAS to build secure systems.

“When ISASecure becomes an integral part of an asset owner’s overall security strategy and program, they can include ISA/IEC 62443 product and system conformance in their procurement specifications,” said Ristaino. “That means there are fewer security mitigations needed at the operating site.” The ISASecure program was founded in 2007 and has been elevating the security levels of COTS products since 2010, he added, and “some companies are now informing suppliers that they want ISASecure-compliant products.”

ISASecure has developed a 3-day training class for product developers and assessors (IC47) to teach them how to develop secure products conformant to ISA/IEC 62443-4-1, 4-2, 3-3. “ISASecure is also developing a new program to certify OT systems to ISA/IEC 62443 deployed at operating sites like PETRONAS, along with a 3-day assessor training class,” Ristaino said. Other OT cybersecurity work is being done by ISA in: Standards development. The ISA99 Standards committee writes and publishes the ISA/IEC 62443 standards on which all ISA OT cybersecurity activities are based. The work of this group of ISA volunteers “codifies what amounts to thousands of years of combined experience in OT cybersecurity,” said Ristaino.

Workforce development. ISA educates more than 3,000 students per year on automation and control cybersecurity topics through its online and in-person Training courses and annual events. ISA’s inaugural OT Cybersecurity Summit was held in Aberdeen, Scotland in 2023 and the 2024 summit will be held in London June 18-19.

Credentials. ISA’s Cybersecurity Certificate programs provide credentials to OT cybersecurity professionals. “ISA offers the most comprehensive set of industrial cybersecurity certificate programming and aligned training courses in the world,” said Ristaino. The programs are designed to deliver in-depth, OT-specific knowledge through a series of training courses designed to increase the cybersecurity maturity of individuals and entire organizations. It’s another step in the journey toward a culture of cybersecurity.

Advocacy. The ISA Global Cybersecurity Alliance (ISAGCA) advocates for adoption of ISA/IEC 62443 by suppliers, asset owners, integrators, and public policy makers, and develops work products to accelerate adoption. The ISAGCA blog regularly provides information on risk assessment, compliance, education, and more.

Incident response. The ICS4ICS, or Incident Command System for Industrial Control Systems, is an ISAGCA effort that helps operating sites respond to and recover from attacks. It provides workforce development and credentialling for “incident commanders”—the people who must respond to industrial control system breaches and other cyberattacks. For response structure, roles, and interoperability, ISAGCA joined forces with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity response teams from more than 50 participating companies to adapt the Federal Emergency Management Agency (FEMA) Incident Command System. This system is used daily by first responders worldwide in emergency situations like fires, industrial accidents, extreme weather events, and other high-impact situations.


  • DS200SHVMG1AGE Analog I/O board
  • DS200SI0CG1A6A Input/Output Module
  • DS200SHVMG1AFE SCR High Voltage Interface Board
  • DS200RT8AG3AHC Relay Output Terminal Board
  • DS200FSAAG1ABA PCB Field Supply Gate Amplifier Board
  • 531X307LTBAFG1 F31X307LTBA LAN I/O Terminal Board
  • ABB AFS670 19" Ruggedized Switch AFS670-EREEDDDSSEEEEEEEPZYX05.1.0
  • NI Controller for VXI VXIPC-871B
  • IS200EPMCH1GE Mark VIe Patch Cord Power Distribution Card
  • VMICPCI-7632-03310 IS215UCCAH3A 350-657362-003310J GE gas turbine system control processor board
  • WEA13-13 2508-21001 Control Module / I/O Board
  • WES5120 2340-21004 Controller Main Module
  • WES5120 2340-21006 Field Controller Master Unit Module
  • ​ WESDAC D20ME 18-MAR-13 Excitation Control Module
  • D20 EME 2400-21004 Ethernet communication and expansion module
  • GE DS3800XTFP1E1C Thyristor Fan Out Board Brand
  • GE SR745-W2-P1-G1-HI-A-L-R-E Feeder protection relay
  • GE IS230TNDSH2A Discrete Output Relay Module Brand
  • GE Fanuc IS200TDBSH2ACC Mark VI Terminal Board Brand
  • GE PMC-0247RC-282000 350-93750247-282000F Disk Drive
  • GE PMC-0247RC-282000 350-93750247-282000F Disk Drive
  • GE VMIVME-1150 Serial Communications Controller
  • GE VMIVME-5576 Fiber-Optic Reflective Memory with Interrupts
  • GE VMIC Isolated Digital Output VMIVME-2170A
  • GE MULTILIN 760 FEEDER MANAGEMENT RELAY 760-P5-G5-S5-HI-A20-R-E
  • GE IS200AEPAH1BKE IS215WEPAH2BB Printed circuit board
  • GE IS210BPPCH1A Mark VIe I/O Pack Processor Card
  • GE IS220PRTDH1A 336A4940CSP6 High-Performance RTD Input Module
  • GE IS220PDIAH1BE 336A5026ADP4 Discrete Input Module
  • GE IS420ESWBH3A IONET Switch Module
  • GE 516TX 336A4940DNP516TX 16-port Ethernet switch
  • GE EVMECNTM13 Embedded control module
  • GE EVPBDP0001 EVPBDP032 control module
  • GE Hydran M2-X Enhanced Monitoring with Extended Sensor Life
  • GE UR6CH Digital I/O Module
  • GE IC695CPU315-CD Central processing unit
  • GE 531X305NTBAMG1 DR Terminal Board
  • GE 531X305NTBALG1 NTB/3TB Terminal Board 531X Series
  • GE 531X305NTBAJG1 NTB/3TB Terminal Board.
  • GE 531X305NTBAHG1 NTB/3TB Terminal Board 531X
  • GE 531X305NTBAEG1 is a PCB that functions as a DR terminal board.
  • General Electric 531X305NTBACG1 NTB/3TB Terminal Board 531X
  • GE Digital Energy D20 Analog Input Module
  • GE 94-164136-001 main board Control board
  • GE 269 PLUS-D/O-100P-125V Digital motor relay
  • GALIL DMC-9940 High-performance motion controller
  • FUJI NP1BS-08 base plate
  • FUJI NP1Y32T09P1 Transistor drain type digital output module
  • FUJI NP1Y16R-08 Digital Output Module
  • FUJI NP1X3206-A High-speed digital input module
  • FUJI NP1AYH4I-MR current output module
  • FUJI NP1S-22 Power module redundancy
  • FUJI RPXD2150-1T servo drive module
  • FUJI FVR008E7S-2UX Ac frequency converter
  • FUJI Ac frequency converter FVR008E7S-2
  • FUJI FVR004G5B-2 Small general-purpose frequency converter
  • FUJI A50L-2001-0232 Industrial control module
  • FUJI A50L-001-0266#N High-performance servo amplifier
  • Honeywell FS7-2173-2RP Gas sensor
  • Honeywell 10106/2/1 Digital Input Module in Stock
  • FRCE SYS68K CPU-40 B/16 PLC core processor module
  • Foxboro FBM I/O cards PBCO-D8-009
  • Foxboro AD916AE Digital Control System (DCS) Module
  • GE SR750-P5-G5-S5-HI-A20-R-E Multilin Relay
  • FOXBORO H90 H90C9AA0117S Industrial Computer Workstation
  • FOXBORO RH928AW | I/A Series Relay Output Module
  • Foxboro N-2AX+DIO Multi-functional input/output module
  • Foxboro RH924WA FCP280 Fiber Optic Network Adapter
  • FOXBORO H92 Versatile Hardware Component In
  • Foxboro FBM218 P0922VW HART® Communication Redundant Output Interface Module
  • Foxboro E69F-TI2-J-R-S E69F Series Current-To-Pneumatic Signal Converter
  • Foxboro E69F-BI2-S Converter
  • Foxboro H92A049E0700 The host of the DCS control station
  • Foxboro H90C9AA0117S Industrial computer workstation
  • Foxboro RH101AA High-performance industrial control module
  • Foxboro P0922YU FPS400-24 I/A Series Power supply
  • FOXBORO P0973LN Chassis-based managed switch with independent power supply
  • FOXBORO P0926PA Input/output module
  • Fanuc A06B-6050-H402 3 AXIS ANALOG AC SERVO DRIVE
  • FOXBORO L0130AD L0130AE-0H Power module group
  • FOXBORO 0399085B 0303440C+0303458A Combination Control Module
  • FOXBORO SY-0399095E (SY-0303451D+SY-0303460E) Process control board
  • FOXBORO 0399071D 0303440C+0303443B Input/Output (I/O) Module
  • FOXBORO RH924UQ Redundant Controller module
  • FFOXBORO E69F-TI2-S current pneumatic converter
  • FOXBORO FBM219 RH916RH Discrete I/O Module
  • FOXBORO FBM227 P0927AC Module
  • FOXBORO 0399144 SY-0301059F SY-1025115C/SY-1025120E I/O module
  • FOXBORO SY-60399001R SY-60301001RB Industrial Control Module
  • FOXBORO 0399143 SY-0301060R SY-1025115C SY-1025120E Combined control board
  • FOXBORO 873EC-JIPFGZ electrodeless conductivity analyzer
  • FOXBORO P0916PH (High-density HART I/O Module)
  • FOXBORO 870ITEC-AYFNZ-7 Intelligent Electrochemical Transmitters
  • FOXBORO Compact FBM240. Redundant with Readback, Discrete
  • FOXBORO FBM208/b, Redundant with Readback, 0 to 20 mA I/O Module
  • FOXBORO FBM201e Analog Input (0 to 20 mA) Interface Modules
  • FOXBORO P0916WG Terminal cable
  • FOXBORO P0926MX 2-Port Splitter
  • FOXBORO AD908JQ High-Frequency Module
  • FOXBORO AD916CC Processor module
  • Foxboro DCS FBM206 Pulse Input Module
  • FOXBORO FBM216 HART® Communication Redundant Input Interface Module
  • Foxboro p0903nu 1×8 unit sub-component module
  • Foxboro P0911SM Industrial control module
  • Foxboro CM902WM I/O module
  • Foxboro CM902WL Power module
  • Foxboro P0972VA Industrial Control Module
  • Foxboro Z-Module Control Processor 270 (ZCP270)
  • Foxboro PO916JS 16-channel terminal block module
  • Foxboro PO911SM High-performance digital/analog input/output module
  • Foxboro P0972PP-NCNI Network Interface Module
  • FOXBORO P0971QZ controller module
  • FOXBORO P0971DP Thermal resistance input/output module
  • FOXBORO P0970VB Cable connector
  • FOXBORO P0970EJ-DNBX Dual-node bus expansion module
  • FOXBORO P0970BP Redundant power supply system
  • FOXBORO P0970BC-DNBI DeviceNet bus interface module
  • FOXBORO P0961FX-CP60S Main control CPU module
  • FOXBORO P0961EF-CP30B Network Interface Unit
  • FOXBORO P0961CA Optical fiber local area network module
  • FOXBORO P0961BD-GW30B gateway processor module
  • FOXBORO P0961BC-CP40B/I/A Series high-performance control processor module
  • FOXBORO P0960JA-CP40 High-performance control processor
  • FOXBORO P0926TM Control module
  • FOXBORO P0916BX Termination Assembly
  • FOXBORO P0916AE P0916AG P0916AW Thermal resistance input type DCS card module
  • FOXBORO P0916AC FOXBORO distributed control system (DCS) compression terminal assembly
  • FOXBORO P0912CB High-performance interface module