Blog

3 Reasons an “Air Gap” is Not Good Enough

Select Dynamic field
Is an Air-Gap “Good Enough” to keep your Industrial Control System secure? Short answer: No. Here’s why…

“Security by isolation” or air-gapping previously worked in Operational Technology (OT) environments when OT and IT were completely isolated from one another. Many older systems based on PLC’s and SCADA were built without cybersecurity in mind. OT and IT are now converging as organizations embrace the digital transformation, and security experts are now declaring the air gap dead as security by isolation is not a long-term solution for protecting OT assets.

Air Gapping an OT system has very limited value in today’s constant technological advances. It can no longer be used as a sole security solution in the long term for three reasons:

  • It causes organizations to miss out on valuable data.
  • It is more costly and difficult for maintenance and repairs.
  • It is more prone to security breaches than a “connected” OT system.

Missing out on Data

While air-gapped OT systems can minimize risks, organizations are not able to benefit from the highly valuable data these systems generate. Data analyzed in real time can provide business intelligence to cut costs, reduce downtime, and improve efficiency. These opportunity costs outweigh air-gapping as a viable cyber security measure.

Higher Maintenance Costs

Maintaining air-gapped OT systems are more expensive and difficult because the engineering tools of a connected system cannot be used to perform routine maintenance or troubleshoot problems. It also limits the system from secure remote support by technical experts. Without remote access, facilities experience higher support costs and increased downtime. The reality is that even a properly air-gapped system is not completely protected; Every system is a potential breach target, and even air-gapped systems can be infiltrated. Organizations must engage in active monitoring and security measures to mitigate the risks.

Reduced Security

Air Gaps can be physically breached by a third-party networked laptop, USB drive, removable media, smartphone, or other devices. Allowing OT systems to connect with these devices creates vulnerabilities that air gapping cannot protect against. Air gapping makes it difficult for users to move back and forth between the air-gapped device and network-connected devices. For ease of use, an individual may use an unsecure USB drive to transfer data which could compromise an air-gapped system.

OT infrastructure is only as secure as the user operating the devices. An openly accessible USB port can serve as an entry route for malware. Smartphones provide another convenient route to cross air gaps when switched to Wi-Fi hotspot mode. The Wi-Fi hotspots can also be used as an entry point by hackers or those with ill intentions.

90+% of randomly found USB drives are picked up by the casual person and more than half are plugged into a PC.
Source: Kapersky

Why your OT control systems can’t afford cybersecurity shortcuts:

OT cyber-attacks are more dangerous in nature. An OT attack can pose risks to operational and safety systems, employees, plant, and environment. Because the outcome of an OT cyber-attack is more catastrophic, it is essential that organizations prioritize cybersecurity. While air gapping provides some security, it is not the best option to select in the competitive marketplace.

Air gapped control systems are also more vulnerable because they don’t receive the latest Windows security patches easily, therefore are usually neglected. As new virus threats emerge, the OT system will likely be unprotected, unlike its Enterprise counterpart.

We must accept the fact that air gapping as a security control is no longer a valid option. IT and OT will continue to converge leaving air gapping to be useless. Facilities should take advantage of the opportunities from integrated technologies to reduce costs and downtime while improving efficiency. While doing so, they must prioritize OT security to lessen the risk and still capitalize on the advantages of a connected IT and OT world.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Industrial Cybersecurity


More Posts

Read More
Blog

Has your facility taken steps to prevent unnecessary downtime?

Select Dynamic field
You may have experienced it before:
  • Your operator experiences an abnormal situation that costs you production time, and your in-house staff is too busy to identify the REAL root cause.
  • Extended downtime because a critical part of your control system fails and you don’t have a replacement.
  • You are striving for maximum uptime and production, but your control system is not allowing you to reach your goals.
  • Your control system reaches end-of-life and you can’t get support.
The list goes on. How can you proactively address these issues while ensuring that your control system is not an impediment in reaching your goals?

Partnership with a solution provider may be the key

24UP® Solutions is Champion’s premier Industrial Control System, Operational Technology, and Industrial Cybersecurity solution led by the experts who have seen it all. Clients rely on 24UP® to ensure a proactive response to issues that often arise, but are often not considered – or simply haven’t had the time to address.

Whether simply providing you with the tools to be prepared for unexpected challenges, or being your primary provider of maintenance and 24/7 emergency support – we work with you to tailor a plan that fits your needs and budget. Your company’s 24UP® Solutions could include your highest need to help you achieve your goals, including:

  • PREVENTIVE MAINTENANCE such as routine Control System hardware and OT system diagnostics, backups, and imaging, and other preventative maintenance services
  • ASSET MANAGEMENT such as critical spare parts assessments, inventory, and the services to replace the parts that keep you up at night
  • 24/7 SUPPORT for general maintenance or simply staff augmentation to provide reliability and flexibility
  • CYBERSECURITY MAINTENANCE services such as scheduled audits to help identify your OT system vulnerabilities and implement solutions to protect you from the ever evolving cyber threats
  • PROCEDURE & DOCUMENTATION to enable your team to perform simple control system maintenance without formal training

Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

24UP® Solutions


More Posts

Read More
Blog

Do you have cost-effective support for your multivendor install base?

Select Dynamic field
Is your industrial control system comprised of multiple manufacturers or platforms? Do you know which service team to call when an issue arises? Original Equipment Manufacturers (OEMs) can offer support on their products but often come up short in environments where their equipment is integrated with other “unsupported” equipment.

This is where a System Integrator comes in.

Champion, with expertise in every major industrial control system, supports all parts of your facility’s systems under one agreement tailored to your specific needs. Typically, response times are quicker than a manufacturer would be thanks to the scope and experience of our team. Combined with our Secure Remote Support offerings technology, we are able to provide you services anywhere at any time.

Whether your facility already has in-house support staff, or requires a primary support contact, Champion can offer guaranteed response times based on your needs. Industrial clients can also benefit from our multi-vendor support by receiving unbiased recommendations about system upgrades, network configuration, cybersecurity, and more.

Lastly, Champion’s 24UP® Solutions often save clients money over multiple OEM service contracts or in-house support staff with a ‘one stop shop’ support solution for your industrial control systems and Operational Technology (OT) assets. So whether you prefer a secondary support option or a full umbrella of support, we can tailor and provide the right solution for your needs and budget.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Industrial Automation


More Posts

Read More
Blog

The Top 3 Benefits of a Third-Party Cybersecurity Assessment

Select Dynamic field
Most companies are not compliant with mandatory industry or governmental guidance and regulations relating to their cybersecurity practices. In fact, only 23% of companies who participated in a 2018 Kaspersky study report that they meet the standards. [1]
Even further, 56% of companies say they will increase their cybersecurity budgets in the next year due to potential incidents and risks associated with their current infrastructure and policies. [1]

One of the first investments your organization can make is to perform a Cyber Criticality Assessment. A Cyber Criticality Assessment is a process that allows organizations to identify general threats, determine the worst-case impact, whether it’s Financial, Safety, Health, Environmental, or otherwise, of devices/software becoming unavailable, unreliable, or compromised. The assessment process includes a survey, a vulnerability assessment, and a risk assessment to allow your organization to determine the severity of the consequences should a device or network not perform as intended.

There are key benefits to inviting a professionally certified, expert third-party team to perform your cybersecurity assessment.

1. Unbiased approach to your system.

Third-Party Assessment teams do not represent any hardware or software manufactures. This enables them to take an unbiased approach to your system. While internal teams may have critical knowledge of your control system and may have even designed it, third-party assessors can see both macro and micro-levels of your control system. They will see gaps in a system that internal teams can miss.

This is doubly important when it comes to Operational Technology (OT) and Industrial Control Systems (ICS) because all control system manufacturers have their own products and solutions for implementation. An unbiased third-party assessment team, especially one with a deep understanding of OT systems can connect manufacturer solutions with industry best-practices for solutions that fit your requirements.

2. Cybersecurity experts with the necessary background are difficult, if not impossible, to find.

The cybersecurity industry is expanding and growing at an astounding rate, and the demand for qualified and experienced professionals is fierce. Even when they can’t find qualified professionals to hire, many companies are still hesitant to hire outside help. According to a Kaspersky study released in 2018, 92% of companies who participated in the Kaspersky study prefer to maintain in-house OT and ICS cybersecurity personnel [1]. At the same time, 58% percent of companies find it difficult to find and hire employees with the necessary skills to address their organization’s OT/ICS cybersecurity challenges [1].

  • Is your company in a position to contribute resources to compete in the cybersecurity hiring market?
  • Is your company willing to be responsible for the cost of ongoing training, specialization, and other costs that come with hiring full-time personnel?
  • Does your company have the time and capacity to invest in a ground-up OT/ICS cybersecurity program from within?

If not, consider working with a third-party OT/ICS cybersecurity team who has the expertise and personnel to do the bulk of the work for you.

3. IT vs. OT – It’s not a competition, it’s a complementary approach.

Cooperation and collaboration between OT and Information Technology (IT) is critical for your company’s complete, comprehensive cybersecurity investment. But does your IT team have OT knowledge and expertise?

A third-party assessment team with an OT/ICS background can connect manufacturer products and solutions with industry best-practices and methodologies that meet your requirements. They fill in the OT knowledge gaps that your IT team may lack. For example, assessors with OT backgrounds can provide insight on which control hardware your system uses that meet ISASecure® standards [2]. This is especially critical if your control system uses hardware and software from many different manufacturers.

A top-rated cybersecurity team with both IT and OT backgrounds can help to ensure that your cybersecurity assessment includes all aspects of your control system and business networks while working with your already-established IT team.

If you’re interested in learning more about Cybersecurity System Assessments for your system and establishing a strong foundation for your company’s cybersecurity policies and procedures, click here to reach out to Champion’s team of cybersecurity experts.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.


[1] Kaspersky, “2018-Kaspersky-ICS-Whitepaper.pdf,” 2019. [Online]. Available: https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf

[2] ISA, [Online]. Available: https://www.isasecure.org/en-US/Certification

Savoy Stewart, “firms-investment-on-cyber-security-by-industry,” [Online]. Available: https://www.savoystewart.co.uk/blog/firms-investment-on-cyber-security-by-industry

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Industrial Cybersecurity


More Posts

Read More
Blog

Safe and Sound Delivery

Select Dynamic field
Moving data is imperative to a successful business. Whether it’s from one area of your organization to another or to an outside party, transferring information and files is part of everyday work. But if that information is particularly sensitive or proprietary, certain precautions must be made to ensure it is protected from being compromised.

Data that should be securely transferred:

  • Proprietary Data – any data that must be kept private for confidential, competitive, or other business reasons. This sensitive data can be your company’s internal knowledge base, plans, communications, recipes, processes, financials, or other intellectual property.
  • Client Data – any information owned by your clients that you use to do work for them. This may include batch recipes, processes, report results, etc.

Understanding the threats

The same threats to the general business IT system can also infiltrate the Operational Technology (OT) system which is the backbone of the facility. Threats to information come in many forms and usually occur from lack of diligence or knowledge on how to properly move information from place to place.

The impact? Risk of exposure. All threats to your network have the potential of stealing information that is vital to your business. This includes theft of intellectual property, identity, and information; sabotage; and even extortion of information. These threats include viruses, worms, trojans, bots, spyware, malware, ransomware, scareware, social engineering, and media attacks.

  • Unintentional Disclosure of Information – malicious programs can cause your data to be shared or seen by parties for which it was not intended. Data can be skimmed, intercepted, and used as ransom.
  • Compromised File Integrity – the loss or inability to maintain file integrity. Any file that can be modified proposes a security risk. Files can be intercepted and modified with malicious macros. What may look like a normal file, transferred by email or an FTP site, may now be a threat.
  • At-risk Channels of Operation – the security of an entire operational technology (OT) network and control system, including all devices, is at risk. Compromised files and PCs (configuration files, OT network devices files, firewalls) can wreak havoc on the overall health and function of the control system and the operation of the facility.

Distributing proprietary information safely

With these risks in mind, what is the best way to share files? The following scenario provides a glimpse of best practices in the real world.

An operator at a chemical plant has pulled a report of emissions data. The report must be delivered to the operator’s supervisor and the state regulatory agency. This data is proprietary information to the company and required by law to be reported.

How does the file get transferred to its proper recipients, internally and outside the company?

Internal Delivery

The data from the PLC is collected by the historian into a spreadsheet file which is used to generate the emissions report. All this occurs in the Operational Technology (OT) environment, not the business IT network. The operator can safely move the report from the OT network file server to the IT network server using Windows File Sharing with security and authentication enabled.

Any time data transits security zones (e.g., OT and IT), it must be subjected to security controls, including but not limited to, authentication, threat inspection, integrity validation, information sanitation, etc.

Once the file is on the IT network server, the report can be delivered internally per the company’s established protocol. This can be by email (if permitted), by internal file server, or by an approved cloud service.

Why not just put the report on a jump drive from the OT device then load it onto the operator’s computer? Because this method yields a greater opportunity for risk. Jump drive use provides the opportunity to connect to less secure zones and unauthorized machines. This means that malware has more opportunities to be installed on this drive.

Additionally, by using Intrusion Detection Systems and Security Information and Event Management systems, it’s possible to record, correlate and alert based on activity on the network.

External Delivery

Once data leaves company-controlled servers, it enters malicious territory and becomes more vulnerable. Delivering files externally must be done in a way that ensures the information gets to its final point intact and without being exposed to the wrong parties.

Using a Managed File Transfer System will ensure end-to-end security and encryption for the data.

Managed File Transfer Advantages

  • Secure from end-to-end (from sender to receiver).
  • Limits admission to only those meant to have access.
  • Interaction with a hosted file is logged and auditable – data is captured showing who and when the file was viewed, downloaded, changed, uploaded.
  • Helps facilitate large file transfers (little to no restriction on file sizes).
  • Users can request files to be sent to them from outside sources securely.

File sharing bad habits are dangerous, if not used correctly. These data transfer shortcuts are dangerous to your organization if not used properly.

Transfer Method Best Practices

  • Email with attached file - Limit to non-sensitive information only. Emails can be forwarded without any control as to who sees it.
  • Jump drives - Drives should be scanned for threats before each usage by a dedicated machine.
  • Commercial cloud sharing sites - Never use a personal cloud site. Use ONLY those managed by your company and deemed safe.

Mitigating cyber threats

Champion has the expertise and knowledge base to help you build a secure file transfer system which aligns with industry best practices and guidelines. Here are a few ways Champion can help make your OT systems more secure.

  • Perform Cybersecurity Risk Assessment.
  • Install anti-virus software and keep it up to date.
  • Install firewalls to create security zones and establish a DMZ between OT and IT networks.
  • Deploy a SIEM (Security, Information and Event Manager) to capture instances of bad habits, jump drive use, and users to identify threats.
  • Establish an Industrial Intrusion Detection System to monitor access and traffic to and from ICS and alert to abnormal activity.
  • Train employees on security best practices.

Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



solution brief

System Hardening


More Posts

Read More
Blog

Microsoft Support for Windows 7 and Server 2008 Has Ended

Select Dynamic field

What does this mean for industrial users?

Is your facility using Windows 7 or Windows Server 2008 for its industrial control systems? If so, you should know that beginning January 14, 2020, Microsoft will no longer be providing security updates or support for these products. This means your systems will become increasingly more vulnerable to security risks.

Can your operation afford the uncertainty of production downtime, proprietary information loss, or even a full system failure? Stay current and migrate to Windows 10, and the latest release of Windows Server. This will ensure you continue receiving the latest security patches necessary for maximum uptime.

Not sure how to migrate?

Champion’s team of Engineers and Cybersecurity Experts have you covered with options that work best for your facility’s needs. Trained in the latest ISA/IEC 62443 and NIST standards for industrial cybersecurity, our specialists have the certifications and real world application experience to recommend the best option for you. We can provide you with system assessments, implementation recommendations based on industry best practices, maintain the integrity of your control system, and lower the exposure to future threats. To read more about Windows 7 and Windows Server end of support, visit Microsoft.com.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



solution brief

DCOM Hardening


Read More
Blog

Humans: A Weak Link in Network Security

Select Dynamic field
A number of studies have found that untrained employees are the biggest threat to an organization’s network security. A study[1] by ESI ThoughtLab found that 87% of executives are aware of this fact. Consequently, companies of all industries and sizes are now putting more focus on preventing (or minimizing) attacks by investing in training for employees using Operational Technology (OT) systems including Industrial Control Systems.

Common Pitfalls

  • Operators accidentally click on a link in a phishing email from an operator station
  • Poor credential management: Allowing unrestricted access to system areas or functions that are not needed for an operator’s job role
  • Incident preparedness: No incident response program. What if something did happen? Is there a well-prepared plan in place
  • User’s credentials are not removed from system when leaving the company.

Mitigation through Cybersecurity

Even trained employees are human. The good news is many weak links can be prevented by improving the security of your ICS network.

Champion’s Certified Cybersecurity Experts are trained in the latest ISA/IEC 62443 and NIST standards for Industrial Cybersecurity. This means you benefit from the most current, comprehensive safeguards for your operations.

Industrial Cybersecurity is an ongoing cycle of assessing vulnerabilities, implementing solutions, and maintaining secure operations without production downtime.

Champion can help you by providing Vulnerability & Risk Assessments of your current network, then offer System Hardening and Configuration to mitigate risks. We can also help you in developing Cybersecurity Policies and Procedures, implementing best practices, and recovery steps for incident response in the event of an attack. We can even host a complete backup of your control system to get you up and running with little or no downtime, should a major disaster strike.

Lastly, as your Cybersecurity Experts, Champion can maintain a secure live Intrusion Detection & System Recovery Systems, Investigate Incidents, and provide a comprehensive incident response plan that fits your needs.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

[1] Source: https://www.controleng.com/articles/untrained-staff-is-the-biggest-cyber-risk-according-to-report/

Source: https://www.exida.com/Blog/cyberattacks-succeed-where-humans-and-systems-are-weak

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Industrial Cybersecurity


More Posts

Read More
Blog

The Crucial Role of a Disaster Recovery Plan

Select Dynamic field
Along the United States Coasts, Hurricane Season is a lengthy period of anxiety and uncertainty for many – especially if your industrial facility is tasked with achieving maximum production and uptime.
Disasters can strike at any time – but not all disasters are in the form of hurricanes, floods, or other natural phenomena. Let’s face it: equipment failures are inevitable; cyber attacks have become commonplace; human error is unavoidable. These are only a few ways your facility can be hurled into “Disaster Recovery Mode.” But, are you prepared?

Preventative Maintenance and Recovery

There is a direct correlation between Preventive Maintenance and how quickly your operation can recover from a disaster. Do you have up-to-date incident response procedures in place to get systems back online if they are compromised? Is your staff trained on those procedures? Do you have adequate spare parts for process-critical and at-risk components?

Is your answer to any of those "no" or "I don't know”? You aren't alone, but don't worry. We're here to help change that with 24UP® Solutions.

What is 24UP® Solutions?

24UP® Solutions is Champion’s solution led by the experts who have seen it all. They understand that no facility, industry, or Industrial Control System is exactly alike. Maybe you have an in-house department dedicated to the livelihood of your Operational Technology (lucky you!). Maybe you rely on support from a major equipment manufacturer. Maybe your industrial process consists of multiple systems and manufacturers working together to achieve your goals.

Regardless of the situation and your facility’s level of in-house expertise, Champion’s 24UP® Solutions professionals can make recommendations, develop procedures & training documentation for your site’s staff, provide routine hardware & system diagnostics, backups & imaging – everything you might need from a Preventive Maintenance angle to ensure the least amount of downtime when disaster strikes.

Our 24UP® Solutions are tailored to your specific needs. Whether simply providing you with the tools to be prepared, or being your one-stop “go to” for maintenance and 24/7 emergency support – we work with you to build a plan that fits.

Don’t have an OT cybersecurity expert on staff? Clients who take advantage of our 24UP® Solutions plans also have access to Champion’s Certified Cybersecurity Experts. Trained in the latest ISA/IEC 62443 standards for Cybersecurity, and holding GICSP certifications in current NIST standards, these experts can be leveraged to provide third-party (read: “unbiased”) system audits, identify and mitigate potential weaknesses, and maintain the latest protections against OT cybersecurity threats.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



solution brief

Disaster Recovery


More Posts

Read More
Blog

The Hidden Costs of Your Legacy Systems

Select Dynamic field
“My old control system is still hanging in there. How can I justify a costly replacement to management?” This is an age-old question, to which many believe: “If it ain’t broke, don’t fix it.” However, when it comes to Industrial Control Systems (ICS), this approach is often the riskier and costlier route for facilities.
The answer lies in Total Cost of Ownership (TCO) – a method of engineering, economic, and financial analysis. TCO aims to consider all of the direct and indirect costs related to a product over its lifetime. The TCO of your car isn’t just the purchase price, but all the related costs over the time you own it: gas, financing, insurance, maintenance, depreciation, and more. The same approach can be applied to a control system over its lifetime.

Common Hidden Costs

Maintenance

The cost of maintaining legacy systems grows exponentially with age. This is due to increased routine problems, along with added system complexity from customization and changes. Over time, updates become more time-consuming and costly.

Talent

In parallel with maintenance costs, talent costs are much higher on a legacy system. Not only are the costs exorbitant in man-hours, but unlike on newer systems, they often require skill sets that are expensive and difficult to find.

Support

As proprietary legacy systems reach a point of limited or discontinued vendor support, the costs of support begin to soar. Tie this to increasing talent costs for external support, longer support response times, and – dare we say it – interruptions in production that affect your bottom line at its core.

Compliance

With industry regulations continually changing, the cost of keeping legacy technology in compliance can be burdensome. Even more costly are the risks of noncompliance, with penalties or fines adding to your Total Cost of Ownership.

Lost Revenue Potential

Without newer features such as mobile data access, or the ability to gather and act via analytics tools, your plant operates on inefficient processes, lower production output, and results in a dwindling bottom line.

New Tech, New Benefits

Implementing new technology can bring a wealth of benefits, from risk reduction and meeting heightened regulatory standards to better decision-making and improved efficiency. Technology of today enables facilities to be more agile, innovative, and cost-effective in an ever-evolving climate.

Concerns of process interruptions can most times be eliminated using well-planned migration approaches, and increased security can alone make the switch a worthwhile investment. Champion’s Certified Cybersecurity Experts are trained in the latest ISA/IEC 62443 standards for Cybersecurity, ensuring your new system benefits from the most current, comprehensive safeguards.

At some point, legacy technology becomes a barrier to daily operations, business stability, and overall growth. By knowing the true cost of running legacy systems, industry leaders can see the clear return on investment (ROI) of embracing new technology and its upward-driving effects on your bottom line.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Industrial Automation


More Posts

Read More
Blog

Staying Compliant With Your Safety Systems

Select Dynamic field

The Process Safety Life Cycle and ANSI/ISA 61511/IEC 61511: An Overview

Champion Technology Services, Inc. understands the challenges plant managers face complying with OSHA 29 CFR 1910.119 Process Safety Management of Highly Hazardous Chemicals (PSM). The ANSI /ISA 61511/IEC 61511 Functional Safety standard provides PSM regulated facilities guidance toward compliance, but is not a prescriptive standard. It does not tell us what to do, nor does it require a particular level of safety for our plant. The standard does provide an objective means of measuring the current level of risk and for objectively reducing that risk. For this reason, it is considered a performance based standard.

This ANSI/ISA 61511/IEC 61511 Process Safety Life Cycle provides process manufacturers with a phased, step-by-step approach to manage process safety throughout the life of their plant. Depending on the size and complexity of the process, each phase can take months or years to complete and may involve a sizable multidisciplinary team. Project management and documentation are critical to long-term success. However, many facilities lack the in-house engineering, implementation, and maintenance resources to design, build, and maintain these systems alone. Champion Technology Services, Inc. is committed to compliance with current standards and engineering best practices to support clients in all phases of the safety life cycle.

The 3 Phases of the Safety Life Cycle

Analysis Phase

Analyze the process, document the safety hazards and the level of safety required to meet your organizations tolerable risk level. The outcome of the analysis phase is typically that a plant is able to mitigate the risk with engineering and operation improvements or that a safety instrumented system (SIS) is required. If a SIS is needed, a Safety Requirement Specification (SRS) must be developed before the Design and Implementation phase can begin. The (SRS) will document all input, output requirements, functional logic, and safety integrity level (SIL) for each safety instrumented function (SIF).

Design & Implementation Phase

Once the SRS is completed, the process of designing, engineering, and selecting a safety system can begin using approved software and hardware subsystems. It is critical to ensure that the SIS is installed, commissioned, documented, and validated by qualified personnel so that it does what it is intended to do and meets the requirements of the SRS.

Operations & Maintenance Phase

Once the SIS is commissioned into service, plant operators should operate and maintain it according to the specified requirements and SIS design plan and keep all documentation current. Procedures should be in place to validate, document, and report any deviation from the applied standards and the SRS. If modifications or additions to the SIS are needed, or if the SIS is decommissioned, it requires re-entering the safety lifecycle at the appropriate step.


Ready to learn more? Contact us today to schedule a no-cost consultation.

We empower our clients to build safe, sustainable operations by delivering comprehensive Operational Technology (OT) solutions. From concept to implementation and beyond– we'll be there every step of the way.

Let's collaborate.

Schedule a no-cost consultation today.



more on our website

Functional Safety


More Posts

Read More