1.1 ICS Basics - Functional Role of A Control System
1.1 ICS Basics - Functional Role of A Control System
ICS Concepts:
Functional Role of A Control System
• Data Acquisition: The control system acts as the central nervous system, constantly gathering
data from a network of sensors and field devices. These sensors monitor critical parameters like
temperature, pressure, flow rate, or liquid levels. This real-time data is the lifeblood of the control
system, providing a constant picture of the physical process.
• Decision-Making and Control: Based on the collected data and pre-programmed logic, the
control system makes critical decisions. Imagine a temperature sensor in a chemical plant
registering a spike. The control system, armed with pre-defined safety protocols, might trigger an
automated shutdown to prevent an accident. This decision-making capability ensures the
process stays within safe and efficient operating parameters.
• Actuation and Optimization: The control system doesn't just observe; it takes action. It can
send commands to actuators like valves, pumps, or motors to adjust physical equipment and
influence the process. For instance, it might adjust the flow rate of raw materials in a
manufacturing line based on production demands. This ability to control actuators allows for real-
time optimization of the physical process.
• Human-Machine Interface (HMI): While the control system operates autonomously, it also
provides a vital link with human operators. The HMI acts as a window into the process, displaying
real-time data, system status, and alarms. Operators can use the HMI to monitor performance,
make adjustments as needed, and intervene in case of unexpected situations.
In essence, the control system in an OT environment is the brain behind the brawn. By continuously
monitoring, analyzing, and controlling physical processes, it ensures the smooth, safe, and efficient
operation of critical infrastructure. Understanding the control system's role is the first step towards
securing these vital systems from cyber threats in today's ever-evolving digital landscape.
The above figure depicts a supervisory control loop, which is a fundamental concept in industrial control
systems. Here's a breakdown of the key components and their functionalities:
Supervisory Control
• Engineering Workstation: This powerful computer is used by engineers to design, monitor, and
configure the control system. They can develop control logic programs, troubleshoot issues, and
update software on PLCs (Programmable Logic Controllers).
• Technician Workstation: This workstation allows technicians to monitor the control system's
performance, view real-time data trends, and make operational adjustments as needed. They
might also use it to initiate maintenance procedures or respond to alarms.
Control Loop
• Controller: This is the brain of the control loop, typically a PLC (Programmable Logic Controller).
It receives data from sensors, executes pre-programmed logic based on setpoints (desired
operating conditions), and sends control signals to actuators. Imagine a PLC in a factory
monitoring a machine's temperature. Based on the program and a setpoint of 70 degrees Celsius,
the PLC might trigger a cooling mechanism if the temperature rises above the limit.
• Sensors: These are field devices that collect real-time data about the physical process being
controlled. Examples include temperature sensors, pressure sensors, or flow meters. This data
is transmitted to the controller for processing.
• Actuators: These are field devices that receive control signals from the controller and influence
the physical process. In our factory example, the actuator could be a pump or a fan activated by
the PLC to regulate machine temperature.
• Process: This represents the physical system or equipment being controlled. It could be a
manufacturing assembly line, a chemical reaction vessel, or a power generator.
Overall Function
The supervisory control system monitors the entire control loop, ensuring the controller is functioning
properly and the process variables (temperature, pressure, etc.) remain within the desired range. The
engineering workstation allows for configuration and program development, while the technician
workstation facilitates monitoring and operational adjustments.
In essence, this supervisory control loop exemplifies how automation and control systems work together
to maintain the efficient and safe operation of industrial processes.
Input: This function involves gathering data from various sensors and input devices within the system.
Inputs can include temperature readings, pressure levels, flow rates, and other parameters relevant to
the controlled process. Inputs provide the necessary information for the system to make decisions and
take action. Attackers may attempt to manipulate or spoof sensor data to provide false information to the
system, leading to incorrect control decisions
Processing: The processing function involves analyzing the input data and executing control algorithms
to determine the appropriate response. This may include adjusting setpoints, activating or deactivating
actuators, and making other control decisions based on the system's programmed logic. If attackers gain
unauthorized access to the control algorithms or logic within the system, they could modify them to cause
unintended behaviour or disrupt normal operations.
Output: The output function involves transmitting commands to actuators and output devices to effect
changes in the controlled process. Outputs may include signals to valves, motors, pumps, or other
equipment to regulate the process according to the system's requirements. Manipulating the output
commands sent to actuators or other control devices could result in physical damage to equipment,
process deviations, or safety hazards
Control systems, despite their intricate nature, can be understood through a simplified lens. Imagine a
control system as a loop constantly monitoring and adjusting a physical process. This loop consists of
three core functions:
• Sensing: Sensors gather real-time data about the process (temperature, pressure, etc.).
• Decision-Making: A controller (PLC) analyzes sensor data and pre-programmed logic to make
control decisions.
• Actuation: Based on those decisions, the controller sends commands to actuators (valves,
pumps) to influence the process and maintain desired conditions.
A single malicious packet sent to the controller could potentially exploit vulnerabilities in any of these
functions, depending on the specific nature of the attack and the system's configuration. Therefore,
implementing robust security measures, such as network segmentation, encryption, access controls, and
intrusion detection systems, is essential to mitigate the risk of attacks targeting ICS inputs and other
critical functions.
Control systems can be very difficult and costly to replace and adjust. This is one of the reasons why
security in this space is lagging. Refreshing a control system is something done very rarely. It is not
unusual for a system to remain in place for 20+ years without many changes.
Complexity Simplified:
The beauty lies in the fact that all control systems and ICS, regardless of their complexity, map to this
basic model.
Vulnerability Points: Understanding these functions also reveals potential attack surfaces:
• Sensor Inputs: Malicious actors might tamper with sensor data to provide false information to
the controller, disrupting the control loop.
• Controller Logic: Cyberattacks could exploit vulnerabilities in the controller's software or logic,
leading to unintended commands and process disruptions.
• Communication Channels: Attacks can target the communication between sensors,
controllers, and actuators, potentially injecting malicious commands or disrupting data flow.
A Single Malicious Packet: A single, cleverly crafted data packet could wreak havoc depending on the
target. If it reaches a sensor and alters the data, it might trigger an unnecessary shutdown. If it infiltrates
the controller, it could rewrite logic and cause equipment malfunction.
Although control systems can be complex, understanding their core functions and potential vulnerabilities
is crucial for building robust defences against cyberattacks