Security PHA Review

1y ago
9 Views
2 Downloads
3.97 MB
27 Pages
Last View : 26d ago
Last Download : 3m ago
Upload by : Warren Adams
Transcription

Chapter 4 of:Security PHA Reviewfor Consequence-Based CybersecurityEdward Marszal and Jim McGloneSecurity PHA Reviewfor Consequence-Based CybersecurityBy Edward Marszal and Jim McGloneCHAPTER4Book Table of ContentsBuy the Complete Book

Security PHA Review forConsequence-BasedCybersecurityBy Edward M. Marszaland Jim McGloneMarszal Final.indb 330-04-2019 1:14:35 PM

NoticeThe information presented in this publication is for the general education of the reader. Becauseneither the author nor the publisher has any control over the use of the information by the reader, boththe author and the publisher disclaim any and all liability of any kind arising out of such use. Thereader is expected to exercise sound professional judgment in using any of the information presentedin a particular application.Additionally, neither the author nor the publisher has investigated or considered the effect of anypatents on the ability of the reader to use any of the information in a particular application. The readeris responsible for reviewing any possible patents that may affect any particular use of the informationpresented.Any references to commercial products in the work are cited as examples only. Neither the authornor the publisher endorses any referenced commercial product. Any trademarks or tradenames referenced belong to the respective owner of the mark or name. Neither the author nor the publisher makesany representation regarding the availability of any referenced commercial product at any time. Themanufacturer’s instructions on the use of any commercial product must be followed at all times, evenif in conflict with the information in this publication.Copyright 2019 International Society of Automation (ISA)All rights reserved.Printed in the United States of America.Version: 1.0ISBN-13: 978-1-64331-000-8 (Paperback)ISBN-13: 978-1-64331-002-2 (EPUB)ISBN-13: 978-1-64331-001-5 (MOBI)No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or byany means, electronic, mechanical, photocopying, recording or otherwise, without the prior writtenpermission of the publisher.ISA67 T. W. Alexander DriveP.O. Box 12277Research Triangle Park, NC 27709Library of Congress Cataloging-in-Publication Data in processMarszal Final.indb 430-04-2019 1:14:36 PM

Copyright 2019. International Society of Automation. All rights reserved.4Process HazardAnalysis OverviewIn the process industries, facilities are systematically assessed to identify possiblehazard scenarios that could result in significant consequences. For each scenario, thesafeguards capable of preventing the accident are evaluated to determine if they areadequate. This exercise is called a PHA, and in the United States, it is required (andrevalidated every 5 years) for all facilities that pose a significant hazard accordingto the Occupational Safety and Health Administration (OSHA), the labor regulator,through the process safety management (PSM) regulation (29 CFR 1910.119). Mostjurisdictions around the world have similar requirements.While PHA methods are routinely used in the wet process industries (e.g.,c hemical, oil refining and petrochemical) and have been a standard part of the engineering workflow since the 1990s, they systematically assess hazards of industrialequipment not common to other industries. In these industries, safeguards are basedon prescriptive (i.e., cookbook) sets of rules that come from years of experience withthe same equipment. For instance, consider a boiler. This piece of equipment eitherheats water or turns water into steam (which is still technically heating water). Boilershave been in use for hundreds of years and as a result, designers have learned whataccidents can occur and have applied safeguards to prevent them. This experience istypically codified in an industry group standard, in this case National Fire ProtectionAssociation (NFPA) 85, Boiler and Combustion Systems Hazards Code. The code is appliedto all subsequent projects to prevent past accidents from recurring. The problem withthis approach is that it presents the answer (i.e., the safeguard that should be used),but it does not present the question (i.e., what accident scenario the safeguard protectsagainst). An example from NFPA 85 is the requirement for an automatic shutdown to39Copyright 2019. International Society of Automation. All rights reserved.Marszal Final.indb 3916-01-2021 17:23:51

Copyright 2019. International Society of Automation. All rights reserved.40Security PHA Reviewclose fuel gas valves if the fuel gas pressure exceeds an acceptable threshold. Althoughthe standard lists the requirement, it does not explain the scenario the safeguard protects against. In this example, the scenario is that the fuel gas valves fail to the openposition, sending a large amount of fuel gas to the burner, which it is not able to consume. This situation can cause the flame to blow out, generating a large gas fuel/aircloud that can subsequently encounter a source of ignition and explode. This information should be of interest to malicious attackers as well as cybersecurity designersbecause it defines the accident scenario (or attack vector) that can be exploited to causedamage.There are significant advantages that all industries would glean from incorporating PHA methods. Performing PHA on all industrial equipment has the followingbenefits: The operations/engineering team gains a better understanding of their equipment. The complete scenarios (attack vectors) that can cause a plant accident aredeveloped. Operations/engineering personnel gain a better understanding of how equipment failures can lead to accidents with potentially significant consequences. New hazards that come from applying new and less understood equipment canbe identified. New hazards that are the result of combining equipment in a new configurationcan be identified. Scenarios that require advanced safeguarding are identified and developed(whether the safeguarding is traditional or based on cybersecurity).Because there are so many benefits to performing a systematic PHA, the authorsexpect this technique to be increasingly adopted by the complete range of processindustry customers. If for no other reason, the authors anticipate it will be adopted todevelop potential scenarios that may require safeguarding through cybersecurity andto define the required level of integrity of cyber safeguarding.All formal PHA methods are exercises in structured brainstorming. They aredesigned to stimulate thinking about a topic by providing a prompt to trigger ideasand a framework in which ideas can be evaluated. The prompts range from checklist questions or equipment lists to process parameters, depending on the selectedtechnique. Brainstorming is expected to identify scenarios that the prompt identifies.Copyright 2019. International Society of Automation. All rights reserved.Marszal Final.indb 4016-01-2021 17:23:51

Copyright 2019. International Society of Automation. All rights reserved.Chapter 4 – Process Hazard Analysis Overview41The scenarios are subsequently analyzed. PHA techniques are generally applied usingthe following steps:1. Select a prompt to generate potential scenarios.2. Brainstorm about the prompt to identify any credible scenarios related to it.3. For each credible scenario that is identified:a. Determine the consequence of that scenario assuming that no safeguardsoperate.b. Determine what causes or initiating events can make the scenario occur(e.g., equipment failures, human error, and external events).c. For each cause, determine what safeguards are available and to what degreethey are effective in mitigating the scenario under consideration.d. Consider all available safeguards and determine the likelihood of the accident scenario occurring.e. Consider the consequence and likelihood of the scenario in the context ofthe organization’s criteria for determining acceptability of risk, and assesswhether the scenario is tolerable as designed

Security PHA Review for Consequence-Based Cybersecurity. Security PHA Review for Consequence-Based Cybersecurity By Edward M. Marszal and Jim McGlone Marszal_Final.indb 3 30-04-2019 1:14:35 PM. . Chapter 4 - Process Hazard Analysis Overview 41 The scenarios are subsequently analyzed. PHA techniques are generally applied using

Related Documents:

Goals and Objectives. Identify the PHA’s quantifiable goals and objectives that will enable the PHA to serve the needs of low-income and very low-income, and extremely low-income families for the next five years. Include a report on the progress the PHA has made in meeting the goals and objectives described in the previous 5-Year Plan. PHA Goals:

Section One: Introduction 1 Section One Introduction 1.1 What is the PHA Plan? The PHA Plan is a comprehensive guide to public housing agency (PHA) policies, programs, operations, and strategies for meeting local housing needs and goals. There are two parts to the PHA Plan: the Five-Year

6 Án lam sa ha. (3 lần) CHÂN NGÔN TỊNH TAM NGHIỆP: Án ta phạ, bà phạ thuật đà ta phạ, đạt mạ ta phạ bà phạ thuật độ hám. (3 lần) CHÚ ĐẠI BI Nam mô Đại bi Hội thượng Phật Bồ tát. (3 lần) Thiên thủ thiên nhãn vô ngại đại bi tâm đà la ni. Nam mô hắc ra đát na đa ra dạ da. Nam mô a ri da, bà lô yết đế .

PHA-202 RS/GY/CP 200922 General Description The PHA-202 (RoHS compliant) is a medium power amplifier fabricated using E-PHEMT technology and offers extremely high dynamic range over a broad frequency range and with low noise figure. In addition, the PHA-202 has good input and output retu

M2000 / 1 - PH D-Sub Plastic Hood (45 Degree) Dimension Table: Dimension Table: M2000/1-PHA M2000/2-PHA M2000/3-PHA M2000/4-PHA Part No. No. of Pins 09 15 25 37 A 31.0 39.5 53.0 69.5 36.2 40.2 40.2 40.2 B Cable Diameter 4 to 13 mm Hoods available in Plastic, Metalized and Metallic form Cable

ph a-4 th at w o u ld allo w us to exam in e su p p resso rs an d enhancers of compromised pha-4 [25]. The pha-4(ts) strain contains the pha-4(zu225) allele, which carries a premature stop codon and renders pha-4 mRNA subject to degradation by the nonsense-mediated decay pathway[25Ð27]. W

The development of Open PHA is the result of Kenexis process safety engi - neering team experience facilitating thousands of HAZOP and LOPA stud-ies. Open PHA was developed internally by process safety engineers with the intent of providing better HAZOP and LOPA software to address the shortcomings of traditional PHA software packages.

Pipe Size ASTM Designation (in) (mm) (D2310) (D2996) 2 - 6 50 - 150 RTRP 11FX RTRP 11FX-5430 8 - 16 200 - 400 RTRP 11FX RTRP 11FX-3210 Fittings 2 to 6-inch Compression-molded fiberglass reinforced epoxy elbows and tees Filament-wound and/or mitered crosses, wyes, laterals and reducers 8 to 16-inch Filament-wound fiberglass reinforced epoxy elbows Filament-wound and/or mitered crosses, wyes .