Industrial Cyber Security

With the increasing threat of cyber-attacks on Industrial Automation and Control Systems (IACS), it is essential that our client’s systems and plants are secure. Do you know how safe your system is?

Industrial Automation and Control Systems are using more and more commercial off the shelf (COTS) software and hardware products connected on Internet Protocols (IP). Although there are many benefits to this it has resulted in Industrial systems becoming exposed to the same vulnerabilities as business IT systems. To protect against vulnerabilities such as these, it is essential that cyber security risks are assessed and where required, countermeasures implemented.

At Fairfield Control Systems we have created a dedicated Industrial ICT Team to assess, design, implement, monitor and maintain systems to the ISA/IEC 62443 Industrial Security Standards.


At Fairfield Control Systems we have created a dedicated Industrial ICT Team to assess, design, implement, monitor and maintain systems to the ISA/IEC 62443 Industrial Security Standards.

Risk Assessments

A cyber security risk assessment is essential in order to identify potential threats and measure the unmitigated risk against a client’s tolerable risk. Both HSE guidance and Functional Safety Standards such as IEC 61511 also now place responsibility on the duty holder to carryout Cyber Security Risk Assessments.

A cyber security risk assessment ensures new systems are implemented securely and can help target effort and budgets to secure existing vulnerable systems.

Our qualified ISA/IEC 62443 Risk Assessment Specialists are experienced in working alongside stakeholders at all levels within a project to deliver:

  • High Level Risk Assessments
  • Gap Analysis Reports
  • Vulnerability Assessments
  • Criticality Assessments
  • Security Zone and Conduit Models
  • Detailed Risk Assessments


Design and Implementation

The traditional barriers which existed between the IT and Engineering departments can no longer exist in a connected enterprise. Our team has experience in design and configuration of commercial ICT, industrial networks and control systems. These combined skills allow a holistic approach when delivering secure turnkey solutions at all levels; from the PLC networks to Data Capture and enterprise reporting systems.


Cyber Security Management System (CSMS)

To ensure a system remains secure it is essential that a Cyber Security Management System (CSMS) is established and maintained throughout the system lifecycle. This can include:

  • Business Continuity Planning
  • Staff Training and Security Awareness
  • Production of Policies and Procedures, including:
    • Access Control
    • Risk Management
    • User Control
    • Patch Management


Patch Management

Patch management for IACS differs from IT. Within IACS changes can impact safety, reliability, certification and performance of a system and must be part of a controlled change and configuration management process. Patching is often difficult as systems have infrequent and short outages where patches can be installed. Fairfields industrial ICT team work with clients to monitor their systems and notify them of any vulnerabilities and available patches. We also work with clients to assess the risk of a vulnerability in order to understand how urgent the patch is. This enables the client to decide on whether to wait for a planned plant outage or install the patch immediately.

Fairfields can include patch management services as part of a service agreement. These service agreements are tailored for each of our client’s requirements.

We have developed a team that understands cyber security throughout the system lifecycle and can provide a holistic approach to assessment, design, implementation maintenance and monitoring. Our ISA/IEC 62443 qualified specialists strive to meet our customers’ stringent requirements without compromising security, safety or reliability.

Michael Doney – Managing Director, Fairfield Control Systems Ltd.

We use cookies on this website, by continuing to use it we assume consent. Read our cookies policy.  Okay