exida

exida explains Blog

Building Cybersecurity into Software Applications

Building Cybersecurity into Software Applications

An April 2019 report from the Institute of Critical Infrastructure Technology (ICIT) makes the point that even though software ‘runs the world’, software security is an afterthought across virtually all industries. 

The report states that this lack of software security is actually a National Threat given that this…

Read More...

Back to Basics 12 –  What is IEC 61508 Certification?

Back to Basics 12 –  What is IEC 61508 Certification?

IEC 61508 Certification is a Third-Party Validation against the standard’s requirements, comprising of:

  • Detailed Analysis of engineering processes to determine Systematic Capability and Cybersecurity Strength 
  • Detailed Analysis of hardware design / design margins resulting in Random Failure Rate in all failure modes
  • Analysis/Testing to show safe, correct operation and Cybersecurity Susceptibility

To achieve an…

Read More...

When is an Alarm not an Alarm?

When is an Alarm not an Alarm?

The ISA-18.2 and IEC 62682 standards define an alarm as an “audible and/or visible means of indicating to the operator an equipment malfunction, process deviation, or abnormal condition requiring a timely response”.  One of the reasons why alarm systems are out of control (alarm overload, nuisance alarms)…

Read More...

Back to Basics 11 – How is SIL Used by an End User?

Back to Basics 11 – How is SIL Used by an End User?

IEC62443 - Learning Cybersecurity (Prevention Techniques)

IEC62443 - Learning Cybersecurity (Prevention Techniques)

Last Saturday, I read an article about hackers who were behind at least two potentially fatal intrusions on oil and gas industrial facilities (Yes I read cyber articles on the weekend wink). Besides the fact that I enjoy learning about cybersecurity on my…

Read More...

Back to Basics 10 – How Does a Product Get a SIL?

Back to Basics 10 – How Does a Product Get a SIL?

IEC 61508 functional safety standard indicates Safety Integrity Levels (SIL) needs to be evaluated by three design barriers:

  • The Systematic Capability Rating
  • The Architectural Constraints for the Element
  • The Probability of Failure for the Product

What Makes a SIL?

Systematic Capability is achieved when the equipment…

Read More...

SCRUM and IEC 62443

SCRUM and IEC 62443

Information Technology (IT) is the personnel, hardware, and software that controls non-physical devices and/or processes such as websites, financial data, personal information, etc. 

Operation Technology (OT) is the personnel, hardware, and software that controls physical devices and/or processes such as manufacturing, oil & gas, power, etc.  Today, OT has many…

Read More...

Back to Basics 09 – Safety Lifecycle – IEC 61511

Back to Basics 09 – Safety Lifecycle – IEC 61511

The IEC 61511 standard recommends the use of a functional safety lifecycle. Any safety lifecycle can be used, but the standard lays out a process which can be divided into three main classifications as an example. 

The lifecycle is set up like this: 

  1. Analyze the situation and document…

    Read More...

Duty of Care (Too Good to Be True Failure Rate Data)

Duty of Care (Too Good to Be True Failure Rate Data)

I have received several calls lately to our Australia / New Zealand office about whether it is acceptable to use published failure rates that seem too good to be true.

The person calling is usually doing a SIL verification calculation for an operating plant or for an…

Read More...

Back to Basics 08 – IEC 61511

Back to Basics 08 – IEC 61511

IEC 61511: 2016 Process Industry Sector

IEC 61511 is a technical standard that sets out practices in the engineering of systems that ensure the safety of an industrial process through the use of instrumentation. It entails requirements for users of process control and instrumentation for component / element or sub-system safety.…

Read More...

Back to Basics 07– Safety Lifecycle – IEC 61508

Back to Basics 07– Safety Lifecycle – IEC 61508

The IEC 61508 standard recommends the use of a functional safety lifecycle. Any safety lifecycle can be used, but the standard does lay out a nominal 16-step process which can be divided into three main classifications as an example. 

The Analysis phase of the lifecycle deals with gathering background…

Read More...

PIU May Only Get You So Far…

PIU May Only Get You So Far…

Back to Basics 06 – IEC 61508

Back to Basics 06 – IEC 61508

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety. We'll start with some more general terms and descriptions and make our way to more advanced material.

IEC 61508: 2010 International Performance-Based Standard 

TheRead More...

Why the Docker Breach is Noteworthy

Why the Docker Breach is Noteworthy

All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be patching software, revising work processes or altering incident response techniques.

Docker

Read More...

Back to Basics 05 – What is a Safety Function?

Back to Basics 05 – What is a Safety Function?

A Safety Function is the action of a collection of equipment to implement automatic mitigation of a particular hazard. It is the job of the Safety Instrumented Function (SIF).

Some examples of common Safety Functions: 

  • Car brake stop
  • ESD valve – Shutdown process
  • Sprinkler system 
  • High…

    Read More...