Editor's Choice


Hack-proof measurement technology

August 2024 Editor's Choice IT in Manufacturing

Users in the process industry have not prioritised cybersecurity. This might be because they assume it’s the IT department’s responsibility, or they don’t feel directly threatened. However, both attitudes are neglectful, and here’s why: IT security should always be a joint task between IT and OT. Digital networking is rapidly advancing in the process industry, and concepts such as NAMUR Open Architecture (NOA), Modular Type Package (MTP), and Ethernet-Advanced Physical Layer (Ethernet-APL) are increasingly being used.

All of this creates new pathways into the previously isolated automation environment, which provides a convenient entry point for cyberattacks.

The dangers of digital networking

The use of modern, integrated automation solutions is simplifying processes and making them more flexible and efficient, but due to this flexibility, process automation engineers are increasingly placing more emphasis on security. For example, according to the industry association Bitkom, the German economy experiences an annual loss of approximately €203 billion due to the theft of IT equipment and proprietary data, and also from espionage and sabotage. What makes this particularly problematic is that cyber adversaries can come from various backgrounds, ranging from individual ‘script kiddies’ to criminals, and even nation states. Although such attacks are still infrequent in the process industry, operators of power plants, fuel tanks, or equipment in the water industry have recently become more vigilant. It is crucial not to underestimate the fact that any IT attacks can rapidly impact OT areas.

The development of wireless communication has brought about many benefits for users. Level sensors play a crucial role in providing essential data across various industrial sectors. This allows process data to be accessible globally, enabling vendor-managed inventory. For many years, VEGA sensors have been supplying critical data such as level data from reservoir water levels through to coal power station inventory stockpiles.

The emergence of Bluetooth technology has further expanded the use of these applications. Bluetooth simplifies the adjustment and commissioning of sensors and controllers, often helping to prevent accidents. Regardless of the source of the level data, whether from large silos, remote measuring points, potentially hazardous environments, or intricate processing plants, VEGA sensors make the data available where it’s needed. Wireless data transmission is also used to retrieve status information from the sensors, such as reporting maintenance needs or requesting updates, effectively reducing downtime.

From a cybersecurity standpoint, challenges arise. Data is increasingly integrated into production and maintenance systems for further processing in offices or control rooms, creating a gap between operational and security functions.


Holistic security concept

VEGA has invested significantly in obtaining the certification following IEC 62443-4-2 while developing the VEGAPULS 6X. This international set of standards defines security requirements for both hardware and software, and the entire development process of the VEGAPULS 6X was aligned with it. TÜV Nord oversaw this work and rigorously tested every measure.

The VEGAPULS 6X prioritises safety by safeguarding its internal electronics against tampering. It employs a layered security approach called defence-in-depth, comprising various IT security layers such as production equipment security, network security, and security measures for different system components. This strategy protects against threats like data manipulation, denial of service (DoS) attacks, and espionage.

The VEGAPULS 6X incorporates extra security features that include user authentication. Each device is assigned a unique device code and a Bluetooth access code. The Bluetooth connections are encrypted using standardised cryptographic methods, and can be disabled after configuration. The instrument logs all locking and unlocking actions in its event memory, capturing all successful and unsuccessful attempts. Firmware integrity checks ensure the software update package is encrypted and signed, preventing unauthorised software from being loaded into the VEGAPULS 6X. Lastly, the instrument allows data backup for recovery through the DTM, with the option to save parameters using HART-enabled control systems.

What happens in a worst-case scenario?

When defending against a cyberattack, time is of the essence. Companies should make appropriate preparations, which include developing a clearly defined emergency plan to ensure that valuable time is not wasted in case of an attack. It is also essential to plan how to rebuild a secure system in case significant damage is done. The product security incident response team (PSIRT) at VEGA is always ready to help. These experts continuously search for vulnerabilities, assist with updates and patches, address customer enquiries, and take immediate action in critical situations, such as when a user discovers a vulnerability. VEGA also collaborates closely with CERT@VDE, an IT security platform for industrial companies, to report and investigate vulnerabilities.

VEGA level sensors have been used for monitoring industrial processes for many years. The VEGAPULS 6X sensor is designed to be easy to set up, regardless of the application area, technology, or sensor version. VEGA also focuses on simplifying aspects related to cybersecurity, acknowledging that cybersecurity is an ongoing, dynamic process that requires continuous attention. Although VEGA cannot absolve the plant operator of all responsibility, it does provide support by encouraging operators to implement security measures outlined in the guidelines. These guidelines also offer additional suggestions for enhancing the security of production systems.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The future of industrial automation: fieldbus and industrial networking
LAPP Southern Africa Editor's Choice
As a global leader in integrated solutions in the field of cable and connection technology, LAPP recognises that fieldbus and industrial networking technologies are pivotal in shaping the future of manufacturing and production processes.

Read more...
AI-driven innovations with CCTV and cyber security
RJ Connect Editor's Choice Fieldbus & Industrial Networking
The fast progress of artificial intelligence (AI) and video analytics is redefining the rail surveillance landscape. Advancements have bolstered proactive event detection, predictive maintenance and enhanced situational awareness.

Read more...
Loop signature 27: SWAG tuning of simple integrating processes.
Editor's Choice
The chief control engineer of one of the largest petrochemical refineries in South Africa once sent me an email after a course at his plant. He wrote that he had found the section on SWAG tuning of simple integrating processes one of the most informative of the whole course.

Read more...
Don’t buckle under pressure
VEGA Controls SA Pressure Measurement & Control
In Africa, urban populations are increasing and infrastructure is expanding at an unprecedented pace. This makes sustainable water management and treatment more crucial than ever. By investing in VEGA pressure instrumentation, water utilities and municipalities are equipping themselves with pressure sensors that facilitate sustainable water management focused on efficiency, reliability and resilience.

Read more...
Harnessing industrial AI agents for reliable automation
Editor's Choice IT in Manufacturing
The excitement around generative AI (GenAI) has been undeniable, promising wide-ranging changes across industries. However, for those of us in the world of industrial control and automation, the realities of implementing these powerful technologies are a little more nuanced.

Read more...
Futureproof your industrial network security with OT-centric cyber security
RJ Connect Editor's Choice
To achieve digital transformation, industrial operators must first address the daunting task of merging their information technology (IT) and operational technology (OT) infrastructure. In this article, we focus on the importance of strong OT network security and provide some tips on how to strengthen cybersecurity for industrial operations.

Read more...
The symbiotic relationship between OEMs and SIs
Schneider Electric South Africa Editor's Choice System Integration & Control Systems Design
While businesses tend to turn directly to original equipment manufacturers OEMs or vendors when embarking on IT projects, the role of the SI as a key facilitator and partner cannot be overstated.

Read more...
Case History 196: Unstable condensate level control.
Michael Brown Control Engineering Editor's Choice Level Measurement & Control
The operators in a petrochemical refinery were having great trouble in trying to stabilise the condensate level in a vessel, and this was adversely affecting other loops downstream. Several unsuccessful attempts had been made to retune the controller.

Read more...
Playing autoclave roulette
VEGA Controls SA Sensors & Transducers
Autoclaves ensure the sterility of medical and pharmaceutical products before reaching healthcare providers and their patients. To effectively manage these demanding conditions, VEGA provides reliable solutions, specifically the VEGAFLEX 81 and VEGABAR 83 sensors, which are designed to meet the stringent requirements of autoclave operations.

Read more...
Big themes for 2025
Editor's Choice News
2024 was a year of unprecedented innovation and global upheaval. As we look ahead, Amy Webb, CEO of the Future Today Institute asks which technologies will reshape our world in 2025?

Read more...