News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

Detecting Cybersecurity Threats in Operational Technology (OT) and Industrial Control Systems (ICS) 

One of the most crucial safeguards for Operation Technology (OT) is the ability to detect cyber threats within OT networks in real time. Given the importance of availability and uptime, the ability to quickly detect potential threats and respond with appropriate measures is highly stressed. Detection and prevention strategies must be carefully crafted for OT Networks to avoid excessive false positives and potentially unnecessary disruptions.  Let’s look at the key characteristics of a threat detection program:   Tracking key assets and data: Automatically tracking and assigning value to all OT assets, including hardware, software, and network devices.   Logging and Auditing: Comprehensive logging of all activities and events for auditing and forensic analysis in a centralized system.  Alerting and Response: It includes alerting mechanisms and a well-defined incident response plan to respond quickly to detected threats.  Threat Intelligence: To stay informed about emerging threats specific to OT environments, the program integrates threat intelligence feeds and data from various sources.  Continuous Monitoring: The program entails real-time monitoring of the OT network to detect anomalies and potential threats.   Utilize your Asset Inventory to scope your Detection System  Organizations need to first determine what their critical assets are and then prioritize resources accordingly, such as log retention, and frequency of log reviews making informed decisions about which log data should be forwarded to their centralized logging solution.  Identify key assets and data   Assess common threat vectors   Review industry best practices   What logs should be monitored?   Not all unusual events point to malicious activity or demand further investigation. Here are some examples of events that should be monitored on a regular basis, according to the NIST 800-82r3 Publication:  Information Events   Account lockouts   Unauthorized creation of new user accounts   Unanticipated remote login activities   The deliberate erasure of event logs   Event logs becoming unexpectedly saturated with data  Antivirus … Continued

Read More

Nick Hasselbeck Promoted to Vice President of Information Technology

Congratulations to Nick Hasselbeck on his promotion to Vice President of Information Technology! Nick is a valued member of our executive team, providing leadership and guidance on technology, cybersecurity, and integration initiatives. Nick has over 20 years of experience in information technology and has led or been a key contributor to several successfully executed projects that are differentiating us from the competition. His advanced software team has built outstanding custom tools for our client that are now critical to their operations. His internal development team has been on a roll recently, upgrading several companywide tools.  Not to mention all of the cybersecurity work his team does to protect E Tech Group. Congratulations once again to Nick Hasselbeck!  Thank you for your dedication, and enthusiasm to your work and E Tech Group.  

Read More

S88 Specs, Part 3 of 3: Understanding S88 States

After reviewing parts one and two of this three-part series, you now have a conceptual and visual understanding of the S88 standard and its applications.  If you haven’t yet read the first two parts of this series, check out S88 Specs, Part 1 of 3: An Introduction to the S88 Standard and Part 2 of 3: System Modeling Under S88 Standard. Transitioning S88 States Throughout Production In this last entry, we’ll provide the final piece of the puzzle, bringing it all together. We’ll examine the progression through the numerous defined states associated with the manufacturing process as it aligns with S88 and the corresponding model.     Understanding S88 States in Control System Modeling The S88 standard defines various states that units or phases can transition through during their operation. These states, categorized as an Initial State, and Quiescent, Final or Transient states, provide a standardized framework for interaction between recipe phases and control system equipment and control module phases. Let’s explore some of the key states defined by the S88 standard: Quiescent states Held Paused Final States Aborted Stopped Complete Initial State   Idle Transient states Starting Restarting Running Aborting Holding Pausing The states listed here are the typical implementation. The procedural state model can be expanded or collapsed as permitted by the standard. The figure below shows the basic state diagram. Fig.4 State Transition Diagram SC Denotes State Change – state logic completes normally and the state advances as indicated by arrows. Text over the arrow Start, Resume etc. are external commands from batch application or internal to the control system or operator issued. The Hold, Stop, Abort are unique in that they act on multiple steps contained within the shaded rectangles. Handshake signals are implemented between the control system and batch system through command and status bits. They … Continued

Read More

S88 Specs, Part 2 of 3: System Modeling Under S88 Standard

After reviewing part one of this three-part series, you now have a conceptual understanding of the S88 standard and its applications. If you haven’t yet read the first part of this series, check out S88 Specs, Part 1 of 3: An Introduction to the S88 Standard.    Illustrating the S88 Standard in Application  Understanding the S88 standard is only a piece of the puzzle.  It can be difficult to fully grasp its implementation in process.  Having a visual representation of a system utilizing Batch Control in manufacturing can add the next piece.    In this article, we discuss System Modeling under the S88 standard covering the Process, Physical and Procedural Control models, and how the combination of these models enables effective control, monitoring and automation of the process.  Control System Modeling Under the S88 Standard  Modelling is best illustrated using a simple example such as a manufacturing plant with three process trains. Each train is intended to support the same set of three units with each unit of the same type supporting the same set of actions. Variations in terms of size and output are permitted.  In this example, assume each train consist of a reactor, filter and recovery vessel.  Process Model  The process model in the S88 standard serves as a means of organization of the processing activities that are performed by the system i.e. process. The process is achieved using the physical equipment defined in the physical model and the recipes defined in the procedural control model.  Fig. 1 Process Model  Here we could envision supplying ingredients, and reagents or solvents to the reactor, followed by chemical reaction and transfer of the product to the filter. The filter separates the product from the waste and transfers the waste for disposal recycling to the recovery vessel.   Physical Model  The physical model in … Continued

Read More