DCS; Industrial control system
NameDescriptionContent
NEW CENTER
Current Location:

Adding ‘Industrial’ to Cybersecurity Education

来源:automation | 作者:H | 发布时间 :169 days ago | 50 次浏览: | Share:
Adding ‘Industrial’ to Cybersecurity Education
Adding ‘Industrial’ to Cybersecurity Education

As organizations mature their operational technology (OT) security approach, they tend to move from a focus on technology to a focus on building a program to, finally, building a workforce that can run the program and operate the technology. This natural progression has been described as the “Industrial Cybersecurity Awakening Model” (Figure 1).

It can take four years—and sometimes much longer—to reach Stage 5 of the model where organizations intentionally develop an OT security team. The International Society of Automation Global Cybersecurity Alliance (ISA GCA) supported a three-year research project to create a consensus-based OT security body of knowledge and has released a 125-page document and other resources. “Curricular Guidance: Industrial Cybersecurity Knowledge” describes the stages of the model and helps ensure OT security leaders can work with education and training providers that follow a consensus-based OT security body of knowledge.

Figure 1: Developing an OT security team can take four years or longer for organizations.
 
In the recent past, ransomware has been a significant driver in the awakening. Those who have been in touch with their local industries know that automotive manufacturers, salad processors and paper makers have suffered ransom demands that shut down process lines and resulted in a relatively rapid leap from Stage 1 to Stage 3. The aftermath of a breach generally leaves one or two individuals (often the electrical engineering professionals who have now been asked to pick up cybersecurity) asking for the resources required to move the “OT side of the house” to stage 4.

Management of some organizations has contented themselves with the belief that a technology investment alone will get the job done. Stage 3 is as far as they are willing to go. But other organizations, especially those with far-flung operations, are advancing to Stages 4 and 5.

At stage four, the IEC 62443 series of standards provides powerful concepts such as the industrial automation and control system (IACS) lifecycle, the IACS principle roles, system types and maturity levels that are key to building a good OT security program. IEC 62443-2-1 recognizes the need for cybersecurity training by including the following requirements:


  • Development of a cybersecurity training program

  • Providing cybersecurity procedure and facility training

  • Providing cybersecurity training for support personnel

  • Validating the cybersecurity training program

  • Revising the cybersecurity training over time

  • Maintaining employee cybersecurity training records (64443-2-1 Req. 4.3.2.4.1-4.3.2.6.4).

When organizations begin to grapple with these training requirements, they begin to recognize serious impediments, such as:

  • Lack of a widely recognized OT security body of knowledge

  • Lack of consensus-based OT security work roles

  • Lack of validated OT security competencies per work role

  • Lack of role-specific OT security training

  • No discussion of OT security competencies required of non-security personnel.


The role of workforce development

OT security leaders attempting to tackle this issue find a complex and often foreign world of workforce development literature and guidance.

Plethoric government agencies and professional training providers offer workforce development models. Within these models, definitions of key terms often conflict, and some terms have changed official definitions within the models over just a few years. It can be overwhelming to sort through.

With these challenges in mind, a working group composed of qualified representatives from industry, government and academia embarked on a three-year research project to review existing OT security workforce development guidance, and where lacking, establish a consensus-based foundation.

In 2019, the Idaho National Laboratory (INL) and Idaho State University (ISU) convened 15 qualified industrial cybersecurity professionals in ISU’s Simplot Decision Support Center, where they engaged in the bias-eliminating nominal group technique to identify five archetype industrial cybersecurity job roles, and initial knowledge categories not normally covered in traditional cybersecurity education.

The results of this effort were published in November 2021 as “Building an Industrial Cybersecurity Workforce: A Manager’s Guide” which included job descriptions, key tasks and hiring advice. Recognizing that despite its strengths, this document did not constitute a consensus-based body of knowledge for an emerging cybersecurity specialization, the INL, ISA Global Cybersecurity Alliance (ISAGCA), and ISU decided to validate, critique and expand the document by involving a broader group of qualified experts.

In Spring 2022, the ISACGA administered a survey to professionals with interest or experience in industrial cybersecurity. The survey included up to 363 input items and received inputs from 170 qualified respondents. The survey questions, responses, analysis and decisions are available for public review, examination and additional analysis on the ISAGCA website. While this is an impressive level of transparency for a curricular guidance effort, the most exciting part is the guidance itself.

The 125-page document is an essential reference for students, instructors, administrators and industrial cybersecurity practitioners. It is organized around the analogy of a building with three components represented in Figure 2: an environment, a foundation and a superstructure.
 

Figure 2: The 125-page ISAGCA document is organized around the analogy of a building.
 
The Industrial Operations Environment describes the contexts (business, geopolitical, professional and industry) within which industrial control systems and industrial cybersecurity exist. The Industrial Control Systems Foundation describes the elements (instrumentation and control, process equipment, industrial networking and communication, and process safety and reliability) that compose an industrial control system. The Industrial Cybersecurity Superstructure describes the elements (guidance and regulation, common weaknesses, events and incidents, and defensive techniques) that most immediately and intuitively pertain to assuring an industrial control system.

Each component is organized into categories, topics and subtopics to reach a level of reasonable granularity—up to six levels deep. While some topic names are identical to those found in traditional cybersecurity contexts, the study describes the unique or special considerations of those topics for industrial and OT environments.
OT security leaders attempting to achieve Stage 5 can now work with education and training providers that rely on a consensus-based OT security body of knowledge.



Resources

The International Society of Automation Global Cybersecurity Alliance (ISA GCA) supports the author’s research and provides these related resources:

  • Whitepaper: “Curricular Guidance: Industrial Cybersecurity Knowledge,”

  • Webinar: “Curricular guidance to develop a new generation of industrial cybersecurity professionals”

  • PowerPoint Presentation

  • The ISAGCA website contains survey questions, responses, analysis and more.

 
Training a cyber-infused generation of automation professionals

What would you say if someone asked how to best move towards a secure digital future for critical infrastructure and industrial automation?

In late July 2016, I was contacted by my master’s thesis supervisor (Dr. Corey Schou) from Idaho State University (ISU) where I had graduated 10 years earlier. He asked whether I would be interested in teaching a course in ISU’s new Industrial Cybersecurity Program.

As I had spent the first decade of my professional life in industrial cybersecurity, I thought this sounded intriguing. I cleared what I thought would be a one-night-a-week teaching commitment with my employer (FireEye/Mandiant) where I had just been appointed as director of the industrial control systems security virtual business unit and started preparing course content for “Risk Management in Cyber-Physical Systems.”
I was unfamiliar with ISU’s Energy Systems Education and Training Center (ESTEC) where the program was housed. So, when I walked into the ESTEC building and saw the fantastic hands-on educational equipment including programmable logic controllers, variable frequency drives, transmitters, pumps, valves, motors, conveyors and pipes, and talked with the experienced instructors, I realized how special this opportunity could be.

ESTEC is a department-level center featuring five distinct engineering technology programs: electrical, instrumentation, mechanical, nuclear operations and industrial cybersecurity. It features 40,000 sq. ft. of educational laboratory and classroom space spread across four buildings on ISU’s main campus in Pocatello, Idaho.

ESTEC was founded in 2007 with the primary objective of expanding ISU’s existing industrial automation program to meet the growing demand for qualified technical professionals at the Idaho National Laboratory. Hundreds of ESTEC graduates work across the country in places like Simplot, Phillips 66, Chevron, Alyeska Pipeline, Columbia Electric Distributors and many other industrial firms.

When I started teaching, I thought to myself, “Wow, the Idaho State Board of Education has approved the country’s first industrial cybersecurity degree program. ESTEC is already a leader in preparing professionals to go into critical infrastructure environments. We need to teach cybersecurity to these students. This is exactly what the country needs. It’s exactly what the world needs.”

I believed it so firmly that I quit my high-paying job at FireEye to become ESTEC’s Industrial Cybersecurity Program Coordinator. My responsibility was to build the program from the ground up.

Over the next seven years, I authored courses, made curriculum proposals, visited high schools to recruit students, submitted and won grants, graded assignments and exams, and hired faculty. I helped place graduates at national-level employers such as the INL, Accenture, Savannah River, National Renewable Energy Laboratory and HDR Engineering, among others.

One of the accomplishments I am most pleased with is that the Industrial Cybersecurity Program at ISU is stackable. “Stackable” means that students can come into the program directly from high school and earn an Associate of Applied Science degree within two years, or they can come into the program from a variety of engineering or operational technology (OT) degrees—including electrical, instrumentation, mechanical and nuclear operations, as well as on-site diesel power and information technology (IT) systems. Students have completed the program from each of these entry points.

One key to this stackability is that the industrial cybersecurity courses are offered as upper division credit (300 and 400 level), meaning they can provide a pathway to a bachelor's degree. After completing industrial cybersecurity courses, students are pointed to a handful of management-oriented upper-division courses including technical writing, project management, supply chain management and organizational behavior. Once students satisfy their general education requirements, they earn a Bachelor of Applied Science in Cyber-Physical Systems.

ISU has taken program development very seriously. In 2022, the Industrial Cybersecurity Program was recognized as a National Security Agency-designated cybersecurity program of study; and, in 2024, the program achieved ABET accreditation. So, how we are going to move towards a more secure digital future in critical infrastructure and industrial automation? I’d say we have to start with the people—the future workforce.
The Industrial Cybersecurity Program at ISU is an outstanding model for how to do this. Through interdisciplinary stackable pathways, we are developing a new generation of automation professionals capable of seamlessly moving between IT, OT and cybersecurity domains.

This feature originally appeared in AUTOMATION 2024: 1st Annual OT Cybersecurity Trends Report.


  • ALSTOM MVAJM14JB1004A1 - N/O-4N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM MC15-M2 - Gecostat excitation manual control excitation setting
  • ALSTOM RQ 1202 - POWER, ABB RAYMOND, MILLSIDE DEFLECTOR LINER, CROWN 700
  • CONVERTEAM D96-40005 - D9640005
  • CONVERTEAM 2123320 - 2123320
  • Alstom MVAX31S1DD0754A - GRID Alstom 10418907
  • ALSTOM 00305-501-00 - Detector rod plate new
  • Alstom 00305-696-00 - Lock Rod Plate NEW FREE SHIPPING
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM 00786-353-00 - Spring PT DET new
  • ALSTOM A62-0221 - Slow ACTING type B VITAL relay new with box
  • ALSTOM 101-314 - Combustion Engineering GE spring adjustment stud nut
  • CONVERTEAM MAE00-06 - MAE0006
  • Alstom 46553-004-00 - BUTN CONT F/LEVER CELL 1/2 NEW FREE SHIPPING
  • ALSTOM MVAAM11B1BA2530A - MVAAM auxiliary relay
  • ALSTOM MMLG01 - Test Block Module. Boxed
  • ALSTOM MVAAM11B1BA2530A - MVAAM AUXILIARY RELAY
  • ALSTOM MVAAM11B1BA2530A - MVAAM AUXILIARY RELAY
  • ALSTOM EPSC-0070 - Limelight coal flow monitoring kit
  • Alstom Microverter D 3.4/500 - 029.130 004 - New
  • CONVERTEAM GP12/15 - GP1215
  • GE IC693CPU364-EK - Alstom Cegelec Alspa 80-35 CPU 240K Mem & Ethernet Comms
  • CONVERTEAM GP12/37 - GP1237
  • ALSTOM C264MB1M691002320100000C000N10 - Micom C264 DS Agile Bay Controller
  • ALSTOM MVAJM14JB1004A1 - N/O-4N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • CONVERTEAM MVAJ11D1GB0783A - MVAJ11D1GB0783A
  • DNTA 85/100C - ALSTOM soft starter free DHL
  • Alstom KMPC13001F12MEB - Measurement Centre Relay 5 57/120V 50/60Hz
  • CONVERTEAM GDS1003-4001 - GDS10034001
  • CONVERTEAM MP/F1700/G353 - MPF1700G353 (new no box)
  • ALSTOM MC15-M2 - Gecostat Excitation Manual Control Setting
  • ALSTOM 00305-500-00 - Detector rod plate new
  • ALSTOM N895600512D - Villeurbanne Card M 1000417012 Board 1040 ECPU1
  • ALSTOM D-984-0579 - GE FREQUENCY DETECTION BOARD TP305 A/W REV 02
  • ALSTOM 01601-162-00 - Washer 0.338 ID lock new
  • ALSTOM RP3-77-9786-PT1 - TIMKEN BEARING SPACER NEW (A541)
  • ALSTOM P139 - Micom Ptb 04 ATEX3044 P1393604544AW00E01
  • GE V7768-322000 - Energy / CONCURRENT / ALSTOM CPU board
  • ALSTOM MVC 3007-4002 - Screen Ribbon Cable Kit For Two Deltas *NEW*
  • ALSTOM A72DI-5-X-0 - Electrometer 0-300/1800 a
  • ALSTOM 45560-005-00 - Rod pin new
  • ALSTOM D42631P0001 - Locking Ring A513/A519
  • Alstom MFVUM 22D1AA0014A - Digital Frequency Relays Freq Rating 10.001 - 500 Hz
  • ALSTOM MAE 00-05 - I/O termination panel AVE250712
  • ALSTOM 029.144 470 - Generator-Interface 029.144471 FS10 BZB-3.10
  • ALSTOM EPSC-0070 - 100-240V 5A NSMP
  • ALSTOM N895605527E - Villeurbanne Card EHICOM_MOD_GS_2S.517 EHICOM 1000423532
  • ALSTOM 1G-4765 - Item 023116-CC1-1
  • ALSTOM 29545-015-00 - Operation Mech Trunnion new
  • Raymond RE648 - 703 bowl mill feed roll sheet "new" by Alstom Power
  • ALSTOM 5415 - Power assembly for GV7 fan, number:5415, with gray accessories, new
  • Alstom 5/16" 1BMBR0000090 - Power UNC 50 Gram Balance Weights
  • GEC KCC8302 - Alstom thyristor rectifier stack power module 20X-1310CRL 30Z-2116
  • ALSTOM P139 - Micom feeder management bracket control equipment Onebox NFP
  • Alstom MD2000 - Alspa Operating Unit
  • Alstom KCGG14201T50CEC - Single Phase Overcurrent AC Relay by Areva T&D UL Ltd
  • ALSTOM RP3-77-9783-PT1 - ARM GUIDE FAST SHIPPING (B168)
  • ALSTOM R303772P1 - Brown Boveri cover washer, 13335400
  • ALSTOM R303779P1 - 3/6 pinion gear 1-1/2 inch shaft 25 teeth gear
  • Alspa VF 2002 A - Alstom *H2R39E4*
  • Alstom 06714-271-00 - Bushing NEW FREE SHIPPING
  • ALSTOM MC15-M2 - Gecostat excitation manual control excitation setting
  • CONVERTEAM EPIC III E3-F-FN - EPICIIIE3FFN
  • GE FANUC/ALSTOM 316 - FIP CH S2 - IR129 -053034319 / 80801371 - G-64320003
  • GE IC693CMM311M - Alstom Cegelec Communications Control Module Alspa 80-35
  • CONVERTEAM MVS3000-4001 - ALSTOM ALSPA MV3000 driver data manager SKU#2
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power supply
  • CONVERTEAM S98101/118 - S98101118 (new with box)
  • GE GP-2375-B - Alstom Combustion Engineering heavy hex jam nut
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM MVAAM11BJCJ5516A - PROTECTION RELAY
  • ALSTOM LGPG11101R551 - LGPG 111 EE DIGITAL INTRGRATED GENERATOR PROTECTION RELAY
  • CONVERTEAM 251459-000 - 251459000
  • ALSTOM D-996-326-PC25 - Threaded tube fitting C161-2991M25 4730009866528
  • GE FANUC/ALSTOM 317 - FIP CH S2 - IR129 -053034321 / 80801371 - G-64320001
  • ALSTOM D-984-0579 - GE FREQUENCY detection board TP305 A/W REV 02
  • ALSTOM 01054-000-0N - Throw rod bearing new
  • ALSTOM Microverter D 3.4/500 - 029.130 004 - NEW
  • Alstom MD2000 - Alspa Operating Unit
  • ALSTOM 4078B71H01 - Bombardier UMD-125-C contactor coil
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power Supply
  • Alstom D-984-0579 TP305 - GE Frequency Detection Board A/W Rev 02
  • Alstom N895600512D - Villeurbanne Card M 1000417012 Board 1040 ECPU1
  • Alstom PS 421 - PS421 Control Unit
  • GE PIB504 - ALSTOM fiber optical interface board
  • Alstom VAA23ZG8507F(M) - Auxiliary Relay 110-250V AC/DC
  • Cegelec/Alstom GDS1017-4001 - Alstom Enhancement Card
  • Alstom 34232-084-01 - Sw Mach Oiler Fitting NEW FREE SHIPPING
  • ALSTOM MVAJM15JA1002A - HIGH SPEED TRIPPING AND CONTROL RELAY
  • ALSTOM 00441-005-0N - Screws 4PK NEW
  • ALSTOM MT96-MPSU011 - MCMM003,MT93-HXC1XXX015,MCPU020 MDPCIOC002 Power Supply
  • ALSTOM FS-100-331 - Limelight flame spectrometer 110-220 VAC 50-60 Hz (new with box)
  • GE 101-295 - Alstom Combustion Engineering stud adjuster jam nut NOS
  • CONVERTEAM 20X4498/110C - 20X4498110C
  • ALSTOM D-984-0584 2/4 - FLAME & FAULT ALARM BOARD
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • Alstom 54549-000-02 - Sw Mach Gear Complete NEW FREE SHIPPING
  • Alstom 30v9200/110 - Alspa gd3000e Reader Course Board With gds1003-4001 Keypad
  • ALSTOM R461 - POWER PAWL LIFTING LEVEL (1 PIECE) NEW R-461 132214
  • Alstom 029.069 615 - PCB Card
  • Alstom 20x4496 - Power Conversion PCB Card Rev 0004
  • ALSTOM VTT11ZG8050LCH - VTT DEFINITE TIME RELAY 110-125V AC
  • GEC KCC8302 - Alstom thyristor rectifier stack power module 20X-1310CRL 30Z-2116
  • ALSTOM 94-165 - GE Combustion Engineering hinge shaft NOS
  • ALSTOM FV223-M2 - GECOSTAT EXCITER DIODE FAILURE DETECTOR
  • ALSTOM MVAJM14JB1002A1 - N/O-2N/C 220-250VDC high speed tripping and control relay
  • Alstom 34232-064-02 - Drive .188 Oiler Fitting NEW FREE SHIPPING
  • ALSTOM N895604516F - Villeurbanne Card ECPU2_2_2GS SOS.512B Board ECPU2 1000268972
  • CONVERTEAM MVDL800-4701 - MVDL8004701
  • ALSTOM SCN 804D - Measurement interface module
  • ALSTOM RP3-77-9783 - Arm guide for Alstom grid SPO expender (B278)
  • Alstom HTGD333336P0049 - Brown Boveri 4.5" Inch Key Segment
  • Alstom M870D - Bitronics Remote Display Unit 3773
  • ALSTOM D-984-0579 - GE FREQUENCY DETECTION BOARD TP305 A/W REV 02
  • Alstom M870D - Bitronics Remote Display Unit 19490 4053
  • Alstom P701000011S - TFM GW-FE Module M 1000742179
  • ALSTOM A96LC - TYPE A96LC
  • ALSTOM S20-0007-02 - Power Hub accessory * new *
  • ALSTOM RS422 - Module * NEW NO BOX *
  • GE PIB315B - ALSTOM PCB board
  • ALSTOM PRS12N04BH - PRIMA relay
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • ALSTOM MVAJ105JA1002A - TRIPPING CONTROL RELAY
  • NASG 7115 - Holdings Green-Amber Light Panel Assembly for Alstom Cabs
  • ALSTOM P241911B2M0600J - Modular Protection Platform
  • ALSTOM MCHNM01H1AB0500A - MOTPRO MCHNM protection relay