Gauging progress on plant floor cybersecurity

How are packagers and packaging machinery suppliers going about addressing the plant floor cyber challenge?

Chart 1—Packaging World's Cybersecurity Survey Results
Chart 1—Packaging World's Cybersecurity Survey Results

One year ago, Packaging World published a two-part series on the topic of plant floor cybersecurity for the consumer packaged goods industry. Part one explored the nature of the cyber threat and why it should be on a packager’s agenda. Part two suggested resources and strategies that could be applied to turn discussion into action to address the cyber threat on the plant floor. (Both articles may be downloaded as a single reprint at http://pwgo.to/cybersecurity_reprint.)

As a follow-up, this article provides a high-level update to the cybersecurity landscape and explores if and how packagers and packaging machinery suppliers are actually addressing the plant floor cyber threat. For this update, we have circled back to the resources identified in the original series and are using the results of an August 2016 online survey of packaging machinery suppliers and packaging machinery buyers. This survey queried respondents on their experience with plant floor cybersecurity and on their use of the strategies identified in last year’s articles.

What’s the big picture?
We all know that in the big picture, cybersecurity remains a problem on the national scene. Since our original series in the Fall of 2015, Congress, the President, and numerous government agencies have been at work on the problem.

In 2015, the Food and Drug Administration, the Department of Agriculture, and the Department of Homeland Security updated the Food and Agriculture sector-specific plan for critical infrastructure. This plan cites as a key accomplishment: “The Food and Agriculture (FA) Sector conducted the Cybersecurity Assessment & Risk Management Approach (CARMA) to critically examined cyber threats, consequences, and vulnerabilities from farm-to-fork to better identify and manage cyber risks.” DHS points out that there are more than 200,000 registered food manufacturing, processing (many with packaging), and storage facilities in the US and related to these, the FA Plan says: “One area of interest for the FA Sector is the use of Industrial Control Systems (ICS), such as Supervisory Control and Data Acquisition (SCADA), by many food production and processing facilities. With the vast majority of ICS developing to enhance connectivity and remote access, the vulnerability of these systems to cyber threats needs to be better understood. As the FA Sector becomes increasingly reliant on technology, the sector will continually revisit the issue of cybersecurity.” The plan establishes the Food and Agriculture Sector Coordinating Council whose membership includes many CPG/food companies and associations.

Last December, Congress passed the Cyber Security Act of 2015 after two years of effort by the National Association of Manufacturers (NAM) and others to encourage legislation that would enable real-time sharing of cyber threat information on a voluntary basis without creating new and burdensome regulatory restraints. Early in 2016, President Obama signed two new executive orders on cybersecurity, one creating a Commission on Enhancing National Cybersecurity consisting of business, technology, national security, and law enforcement leaders; and a second creating a Federal Privacy Council to focus on issues of privacy in government databases. In April, he issued a Presidential Policy Directive to strengthen the security and resilience of critical infrastructure against both physical and cyber threats. Again on July 26th, he issued PPD-41, a Directive on coordination of responses to cyber incidents in the public and private sectors, including the food industry.

On August 10th, the Commission on Enhancing National Cybersecurity announced, in the Federal Register, a 25-day period of public input on topics of relevance to packagers including the Internet of Things (IoT). According to NAM, the IoT (also frequently referred to as IIoT, or the Industrial Internet of Things) is the term that they use to describe the systems and devices subject to cyber attack on the manufacturing floor. This public input period is part of a process leading to a commission report to be issued before the end of 2016.

Also in August, the Information Sharing and Analysis Organizations Standards Organization (ISAO SO), funded by the Department of Homeland Security (DHS), closed its public comment period for two documents: one setting out guidelines for the formation and operation of an ISAO and the other dealing with policies, principles, and the establishment of trust between government and private ISAOs for the sharing of information.

Government is clearly trying to get a handle on this problem, and is establishing the legal framework, policies, guidelines, and standards within which both government and private enterprise may act together and separately to protect the digital infrastructure and intellectual property upon which our safety, security, and economy depend. However, frameworks, policies, guidelines, and standards are not solutions. Solutions will come through the efforts of the private sector.

Who is thinking about it?
In the private sector, ISA published a whitepaper in January of 2016 written by Joseph Weiss and entitled “What Executives Need to Know About Industrial Control Systems Cybersecurity.” The executive summary of this paper echoed the advice of this magazine’s series, saying: “A company’s Board of Directors and executive management must continuously and meticulously identify, categorize, and mitigate risks to the organization’s success resulting from cyber attacks. In many cases the largest risk to the well-being of your company, your people, your processes, and your profits may be the compromise of your Industrial Control System—not a data breach.” The idea that manufacturing cyber security is a Board-level issue was echoed by individuals interviewed for this update and in the comments provided by some responding to our survey.

While our survey probably did not reach any CPG board members, it did show that cybersecurity is on the minds of some, but not all of Packaging World’s readers. Forty three percent of packagers reported having a plant floor cyber security program in place. For 64% of the companies with a program, it is managed by the IT department, for 22% by engineering, and for 14% by other executives. While we can’t tell from the responses we received how diverse the cybersecurity teams that these packagers depend upon may be, the conclusion of the same ISA whitepaper highlights the need for IT, engineering, and operations management to be united in the cybersecurity effort. Mr. Weiss concludes: “Culture, knowledge, and experience gaps exist between IT and Operations personnel in most companies, and the coordination of these functions with guidance from a team of Industrial Control Systems Cybersecurity Experts is critical to the success of a comprehensive cybersecurity program.” I would add that cybersecurity is the responsibility of every employee at every level in the organization, and therefore needs strong leadership from line management.

In the broader manufacturing space, the National Defense Industries Association posted this in a July 18th blog: “IT Professionals Still Not Taking Cybersecurity Seriously.” This conclusion was based upon a survey sponsored by Dell of over 600 global IT decision makers in companies with more than 1000 employees who were asked to think about digital transformation technologies such as the Internet of Things when responding to the questions posed to them. Security is considered too late in the process according to 76% of the respondents.

Who is being affected?
Six percent of the packagers responding to our survey reported some sort of known cyber attack against their plant during the last two years, while nearly 30% responded that they didn’t know if their plant had been the victim of cyber crime or not. A similar number of packaging machine suppliers were aware of cyber attacks against their customers, with half of those involving equipment supplied by them. One responder commented: “Unfortunately, we often don’t hear much from our customers unless they need our help.” That is probably a very common situation, and would explain a lower level of awareness among machine builders than among packagers. It would also seem reasonable to conclude that among the 57% of packagers who report that they have no cyber program, it would be difficult to know if an intruder had breached the system, unless the breach led to some confirmed damage. The Verizon 2016 Data Breach Investigations Report shows that often no harm is done. Of 171 confirmed manufacturing incidents reported by Verizon where integrity, confidentiality, or availability was compromised, only 37 of these, or 22%, resulted in confirmed disclosure or disruption. Attackers may simply probe a system to verify that access may be obtained for a later attack. If attackers are involved in cyber espionage, such as looking for product formulas, they may be careful to not leave any trail. Plants that are not actively monitoring internal and external traffic may have no way of knowing they were breached. A cyber infection may lie dormant without detection for a long time. In August, both Kaspersky Lab and Symantec announced finding malware on dozens of major systems around the world that has probably been in place but gone undetected since 2011 or earlier.

Some have commented that 6% seems like a small number compared to the impression of attacks covered in the media. But there are thousands of small to medium manufacturing facilities in North America, and if 6% are being attacked, that represents a lot of plants, a lot of jobs, and a lot of product potentially affected. Utility systems, power plants, pipelines and other critical infrastructure are no doubt suffering a higher frequency of attack and these attacks are more widely known and, so far at least, have greater impact. The McAfee Labs Threat Report for June 2016 reported that in December of 2015 the Ukrainian power grid was attacked (details provided in Feb 25 ICS-CERT alert), leading to the loss of electricity for 225,000 people. Also, in the first quarter of the year, three hospital systems were held for ransom by ransomware. One packager responding to our survey was also the victim of a ransomware attack. McAfee screens 50 billion queries per day for its customer base, and of those, more than 12 million potentially hazardous events are identified every hour. Mobile devices are becoming an increasing concern among these events, with new methods of infection and an increase of more than 50% in the amount of mobile malware detected in the past 6 months. This is of particular concern as it affects mobile HMIs on the plant floor and the use of “bring your own devices” (BYOD) by employees, vendors, and contractors.

Annual Outlook Report: Sustainability
The road ahead for CPGs in 2025 and beyond—Packaging World editors review key findings from a survey of 88 brand owners, CPG, and FMCG readers.
Download Now
Annual Outlook Report: Sustainability
Simplify robotics projects
Take control of your automation journey. Learn how to reduce risks and drive success in packaging robotics.
Read More
Simplify robotics projects