Looking through the
industrial cyber portal
Every power project has different requirements and components
that change the prerequisites for cyber security. At the same time,
cyber security needs to change over the lifetime of a project, making
it tricky to maintain a holistic overview of projects around the world.
Siemens Energy has therefore developed an industrial cyber
security portal that simplies the integration of cyber security into
each of its projects, with the aim of delivering products and solutions
that are inherently cyber secure. Junior Isles
denition in alignment with business
units’ offerings and manufacturing, it
also enables understandable and opti-
mised implementation of cyber secu-
rity in processes, technology and
guidelines.
To address these issues, the company
recently launched what it calls its In-
dustrial Cybersecurity Portal (ICS
Portal).
The portal is designed to simplify
security by providing specic func-
tion modules within a central reposi-
tory. Tasks and outcomes are stored
centrally so they can be evaluated and
documented. This will help provide
transparency for the central ICS team
and the business units themselves.
Stensletten said: “It is designed to
serve as a ‘one-stop-shop’ for ad-
dressing all cyber security needs of
any given project. Helping all our
Siemens Energy business units work-
ing with our portfolio, the ICS portal
provides transparency, for example,
on relevant security requirements for
their assets as well as guidance on
related vulnerabilities and their miti-
gation. Featuring automation capa-
bilities, and the ability to contextual-
ise, visualise, and structure the
project data, it has never been easier
to integrate and maintain cyber secu-
rity in the design of our products and
solutions.”
The types of risks that a project
might face could range from a vul-
nerability in an individual compo-
nent delivered to a customer, to a
solution from a sub-supplier that
does not meet the security require-
ments of the customer.
“To remain a trusted partner for our
customers, our portfolio must become
secure by design to protect adequately
against cyber threats, meeting global
regulatory requirements and stan-
dards. To achieve this goal broadly
and holistically can be a huge chal-
lenge. It requires a simplication of
security and the ability to integrate
cyber security into existing business
W
hile digitalisation is seen as
a key pillar of the energy
transition, the growth of
devices connected to the industrial
internet poses a real threat. Certainly,
it is a major concern for executives.
According to PwC’s 25th Annual
Global CEO Survey, 44 per cent of
energy, utilities and resources CEOs
ranked cyber threats as a “top three”
concern. And of all sectors, energy is
among the most targeted.
According to the X-Force Threat
Intelligence Index 2022, the energy
sector ranked as the fourth most af-
fected sector in 2021, with 8.2 per
cent of all observed attacks, behind
the manufacturing industry, the nan-
cial sector, and the professional ser-
vices sector. The war in Ukraine has
no doubt heightened that threat. In
April, for instance, Ukraine’s Com-
puter Emergency Response Team
announced that it had successfully
repelled a series of cyber attacks on
the country’s power grid.
In the past, hacking energy infra-
structure would usually require cyber
criminals to have an on-site deploy-
ment to successfully hack the opera-
tional technology needed to run a
network or plant. With increasing
digitalisation, and as information
technology (IT) and operational
technology (OT) converge, this is no
longer the case.
Today, utilities, factories, etc., typi-
cally use IT systems connected to OT
networks to operate their digital
equipment. This makes it easier than
ever for cyber criminals – whether
nations (cyber warfare) or individuals
– to not only inltrate the IT of a
company, but also the attached OT
operated via those IT systems. To
keep the critical infrastructure secure,
providers of energy technology
equipment nowadays have to provide
state-of-the-art cybersecurity solu-
tions including secure products that
meet all legal requirements.
Commenting on the challenges its
customers are facing and what it can
do as a company, Bernhard Mehlig,
Industrial Cybersecurity Consultant,
Siemens Energy, said: “Companies
that provide us with electricity, natu-
ral gas for heating or oil for transport,
operate complex manufacturing and
production sites that use digital solu-
tions to make their operations more
efcient and protable. These are at
risk from various types of hackers.
The companies that we provide solu-
tions to are becoming more and more
aware of this. So it is important for us
to focus on what we can do to ensure
our customers achieve a secure opera-
tion of the products and solutions we
provide.”
Rune Stensletten, Head of Industrial
Cybersecurity Ofce (ICS Ofce),
Siemens Energy, added: “The indus-
trial products and solutions we pro-
vide to our customers cannot be pro-
tected in the same way as IT
infrastructure. Trying to secure these
systems is a highly complex task. So
what we are doing is trying to collect
and dene best practice and guidance
centrally and provide it to our internal
business partners. The purpose of our
industrial cyber security team is to
support our businesses involved in
the execution of customer projects
and product development.”
Although each business unit of Sie-
mens Energy has its own industrial
cyber security community, which
oversees cyber security for products
and solutions coming out of the spe-
cic business unit, the central ICS
Ofce coordinates all the various ef-
forts. This includes cyber resilience
of Siemens Energy’s various manu-
facturing and production sites as well
as the security of products and solu-
tions provided to its customers.
Such an approach enables each
business unit’s ICS community to
bring their expertise to customer
projects, answering all questions and
meeting the needs of the customer.
But in an environment that is changing
quickly there has to be a coordinated
way of managing this community of
ICS experts and bringing them up to
speed with the latest requirements for
each product and solution. This is
where the central ICS team comes in.
A good example is the differing and
evolving cyber legislation in the re-
gions Siemens Energy is operating in.
In the EU, the recently introduced
Cyber Resilience Act (CRA) requires
each project in the energy industry to
meet certain criteria. Cyber security
therefore is a business enabler and
market access requirement in many
countries, as technology providers are
not able in some parts of the world to
conduct business without complying
with existing legislation. Further,
customers themselves might have
specic requirements that can be a
deciding factor in selecting an equip-
ment supplier.
Executing projects worldwide is al-
ready a complex task; and cyber secu-
rity adds yet another layer of com-
plexity that has to be addressed. As
Mehlig put it: “There are already a lot
of moving parts and a lot of resources
and deliverables have to be aligned.
Cyber security adds to that. And if
you look at the specic cyber security
task there is a sequence that has to be
followed and tasks have to be execut-
ed iteratively. You have to have all
your ducks in a row.
“This presents challenges for tech-
nology companies, from both a cen-
tral point of view and in a customer
project context to keep track of risks
originating from cyber security is-
sues, e.g. non-compliance to cyber
requirements or security vulnerabili-
ties in products or solutions. Essen-
tially, one needs enough transparency
when it comes to cyber risk to act
appropriately.”
According to Siemens Energy, hav-
ing the tools to keep track throughout
its cyber community is therefore key.
Having this ability not only drives
horizontal cyber security portfolio
Mehlig: “Essentially, one needs enough transparency when it
comes to cyber risk to act appropriately.”
THE ENERGY INDUSTRY TIMES - FEBRUARY 2023
8
Special Supplement: Cyber security
Stensletten says the portal is designed to serve as a ‘one-stop-
shop’ to address all cyber security needs of any given project