{"title":"Security Analysis of the Module Type Package Concept","authors":"Marwin Madsen, Anna Palmin, A. Stutz, Mike Barth","doi":"10.1109/INDIN51400.2023.10218151","DOIUrl":null,"url":null,"abstract":"To address the need for flexibility of production plants in the process industry modularization is a widely accepted approach. In particular, the Module Type Package Concept described in VDI/VDE/NAMUR 2658 is seen as a possible core part for modularization. A clear separation of engineering efforts into plant-independent module engineering and plant-specific integration engineering as well as a fast integration of a module’s automation system into a higher-level process control system changes the fundamental automation architecture. However, in the state-of-the-art technical literature which has been analyzed and applied by the authors, few security considerations are made for modularization and especially the Module Type Package. This is even more problematic considering that even with an extensive field of security analysis, standards, and guidelines to secure conventional operational technology recent reports found severe vulnerabilities in those. This paper elaborates on security standards and guidelines to which the Module Type Package Concept should be compliant to achieve a high coverage regarding security requirements in the context of industrial automation and control systems. Based on this a security analysis of the Module Type Package Concept is performed on the IEC 62443, VDI/VDE 2182, and NIST SP 800-82.","PeriodicalId":174443,"journal":{"name":"2023 IEEE 21st International Conference on Industrial Informatics (INDIN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 21st International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN51400.2023.10218151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
To address the need for flexibility of production plants in the process industry modularization is a widely accepted approach. In particular, the Module Type Package Concept described in VDI/VDE/NAMUR 2658 is seen as a possible core part for modularization. A clear separation of engineering efforts into plant-independent module engineering and plant-specific integration engineering as well as a fast integration of a module’s automation system into a higher-level process control system changes the fundamental automation architecture. However, in the state-of-the-art technical literature which has been analyzed and applied by the authors, few security considerations are made for modularization and especially the Module Type Package. This is even more problematic considering that even with an extensive field of security analysis, standards, and guidelines to secure conventional operational technology recent reports found severe vulnerabilities in those. This paper elaborates on security standards and guidelines to which the Module Type Package Concept should be compliant to achieve a high coverage regarding security requirements in the context of industrial automation and control systems. Based on this a security analysis of the Module Type Package Concept is performed on the IEC 62443, VDI/VDE 2182, and NIST SP 800-82.