New ISA book introduces an inexpensive, easy-to-understand way to protect against industrial cyberattack

With their advanced, microprocessor-based technologies, today’s industrial automation and control systems (IACS) deliver much-improved performance and features compared to their analog counterparts. 

Unfortunately, these newer, networked systems-with their ability to be configured remotely-are more vulnerable to cyberattack.

Security PHA Review for Consequence-Based Cybersecurity, a new book published by the International Society of Automation (ISA), introduces an easy-to-follow, cost-effective methodology for safeguarding critical infrastructure and process industry facilities from cyberwarfare and other forms of cyber-risks.

The book illustrates how a Security Process Hazards Analysis (PHA) Review identifies hackable scenarios, ranks them appropriately, and pinpoints non-hackable safeguards-such as relief valves and current overload relays-that are not vulnerable to cybersecurity threats.

Written by Edward Marszal, PE, and James McGlone-two globally recognized experts in process safety, industrial cybersecurity, and the ISA/IEC 62443 series of IACS security standards-the book is designed to deliver clarity, simplicity, and confidence to those responsible for industrial cybersecurity.

“We were prompted to write this book because the industry and the cybersecurity practitioners are still unsure of what to do and why,” emphasizes McGlone. “In addition, the current approach in industrial cybersecurity focuses on network devices such as computers, Level 3 switches, and firewalls instead of on the process and machines that could be damaged or cause damage if control is lost.

“By analyzing the cause of and safeguards for cybersecurity weaknesses,” McGlone explains, “it’s possible to determine consequences that are potentially unaffected by the safeguards and those that could be caused by malicious intrusion, such as hacking. Any consequence that is not protected by existing safeguards or that can be caused by a cybersecurity attack is assigned an ISA/IEC 62443-based Security Level Target to be implemented or it is assigned an alternative safeguard or redesign to eliminate all or some of the cybersecurity risk.”

McClone points out that the book is targeted to a wide range of automation and process industry professionals, including:

  • Instrumentation and control system engineers and technicians
  • Network engineers
  • Process safety, health and safety, cybersecurity, and maintenance personnel
  • Executives focused on risk reduction

——————

To purchase a copy of Security PHA Review for Consequence-Based Cybersecurityclick here.

For more details, read the informative author interview
For greater perspective on the value and significance of the new book as well a more detailed overview of its content, read the Q&A feature with one of the book’s authors.

Source

Related Articles



Editor’s Pick: Featured Article

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s scalable engineering software, u-control 2000, adapts individually to your requirements. And, the u-control is powerful, compact and fully compatible with Weidmüller’s I/O system u-remote. This article looks at what makes u-control the heart of your automation.

Programmable logic controllers (PLCs) are one of the main components of any automated system. A typical control system has inputs, outputs, controllers (i.e., PLCs), and some type of human interaction with the system, a human machine interface (HMI), for example.

Read More



Latest Articles

  • Thermal Imaging for Data Centres

    February 18,, 2025 Thermal Imaging for Data Centres Data centre maintenance teams have a big share in safeguarding the critical resource that customers and businesses depend upon. Fortunately, they have one secret weapon that enables them to spot issues in an early stage before they turn into big problems: FLIR thermal imaging. The data centre… Read More…

  • What Are Custom Enclosures and Why Might You Need One?

    February 18, 2025 In the world of industrial and commercial applications, custom enclosures play a critical role in protecting sensitive equipment and ensuring operational efficiency. But what exactly are custom enclosures, and why might you need one? Proax Technologies breaks it down. What Are Custom Enclosures? Custom enclosures are protective casings designed to house electrical, mechanical, or… Read More…