Thursday, July 15, 2021

Cybersecurity for Fire Alarm Systems

 Cybersecurity for Fire Alarm Systems

Active fire protection typically requires some sort of input, such as a person triggering a fire alarm. Where it is automatic, such as with sprinklers or alarms which detect smoke and fire, these systems are usually localised, operating only within a certain vicinity. To turn them off, you usually have to access a valve or control panel and make the change manually.

From cell phones to refrigerators, we live in an interconnected world. The Internet of Things (IoT) is the network of physical objects — such as cars, thermostats and watches — that have the ability to exchange data and interoperate with existing network infrastructure. They transmit data to manufacturers, owners or other devices, and can be sensed and controlled remotely. It provides us with real-time control and information from IoT-enabled products and systems.

Networked fire Alarm systems have a number of advantages over these traditional ones. If an alarm goes off, for instance, a networked system can tell you exactly where it is and when it was activated, giving you more information that you can use to take action. It can also allow you to link different parts of a building or site without running cables between them, and can allow you to operate it remotely, either to turn it off or for testing.  Today’s IoT smart buildings include two types of connected technologies: information technology (IT) and operational technology (OT).

Fire alarm control units, intrusion detection systems, mass notification systems and access control systems reside on the OT side usually managed by facilities operations. Both systems have vulnerabilities that commonly include equipment tampering as well as inside and outside threats. Firewalls and other cyber protection processes and devices can help mitigate the potential for a widespread attack and protect the individual components of the IT or OT systems. 

Cyber vulnerabilities can have a dramatic consequence if these products and systems are not properly protected. Building sensors can provide early detection of unwanted events such as intrusion or fire. Cameras are used for monitoring and remote surveillance that may communicate with alarm control units that can in turn provide information to end users and monitoring stations. Historically these products were hardwired, but technology has enabled us to communicate either wirelessly or wired through an IT infrastructure that is also linked to the internet. Electronic life safety and physical security infrastructures include emergency communications systems, fire alarm systems, alarm receiving systems, automated teller machine systems, access control systems, surveillance cameras, DVRs, NVRs and the like.

There are a variety of codes, standards and best practice guidelines that can help guide creation of a cybersecurity program. Fire alarm control units may include two types of software: executive software and site-specific software. These applications are covered by UL 864, the Standard for Safety of Control Units and Accessories for Fire Alarm Systems, and NFPA 72. Under part of UL 864, third-party certifiers execute and test the equipment’s software for integrity of normal operation. UL 5500, the & Standard for Safety for Remote Software Updates, covers best practices for software patches and updates. UL 5500 offers guidance on technical attributes necessary for the remote connection to smart devices and safe functionalities and securely executing remote software downloads. Most smart systems rely on the ability to update software remotely or onsite. UL 5500 applies to these applications in conjunction with the product’s end standard. To evaluate through tests, the cybersecurity of critically connected life safety and electronic physical security systems, Underwriters Laboratories has published UL 2900-2-3, the Standard for Software Cybersecurity for Network-Connectable Products, Part 2-3: Particular Requirements for Security and Life Safety Signaling Systems. This newest addition to the UL 2900 series of cybersecurity Standards was developed as a bi-national (U.S. and Canada) consensus Standard and with industry input. It provides a foundational set of cybersecurity performance and evaluation requirements that manufacturers of network connectable products can use to establish a baseline of cyber protection against known vulnerabilities, weaknesses and malware. UL 2900-2-3 was developed specifically for security and life safety equipment and systems. It is a testable standard (not limited to audit-based investigations) applicable to IoT connected equipment such as fire alarm control units, mass notification systems, access control equipment and smoke alarms. For UL 2900-2-3, a three-tiered security approach was developed with an increasing level of security requirements for each tier.

The National Fire Protection Association (NPFA) Code 72 (National Fire Alarm and Signaling Code) describes reacceptance testing of equipment and systems when site-specific or executive software changes have been made and the equipment is commissioned and already in use. Site specific software update requires a 100% test of all functions known to be affected by the change. Currently, 10% of initiating devices that are not directly affected by the change (up to 50 devices) must be tested to verify correct system operation and a record of completion must be kept. These commonsense requirements help ensure full integrity of software changes. However, it would be challenging for any end user or code authority to directly verify that the software changes did not affect the integrity or operation of the system or equipment without additional testing or investigation. Third-party validation, reconfirmation and field testing is crucial. The work on the 2022 edition of NFPA 72, National Fire Alarm and Signaling Code is at the halfway point. The work on the first draft has been completed. In NFPA 72 2022 edition cybersecurity has been added. This is in addition to requirements to be added to 72 addressing cybersecurity that will be included in a new Chapter 11 and references the associated Annex J to address cybersecurity guidance. The Technical Committee on Fundamentals has been tasked with the development of the new chapter on cybersecurity. This chapter is still in development and will not be finalized until the second draft meeting to be held later this year. There is a task group made up of members from a number of the technical committees that are working on the requirements for cybersecurity.

At the time of the first draft this was still located in Chapter 10. At the close of the first draft, the following text was added:

Systems shall be designed and installed in accordance with one or more of the following cybersecurity standards:
(1) ANSI/ISA-62443 Series
(2) NIST Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
(3) UL 2900 Series
(4) or other standards accepted by the authority having jurisdiction.

This is not the final version.

I recommend the use of the EST4, which is an industrial or commercial life safety system with a firewall solution from EDWARDS. The EST4 Life Safety System is a state-of-the-art system with a firewall built to add several layers of protection to your systems. The EST4 comes with a 4-FWAL firewall, which blocks all traffic not needed for EST4 operation. It also features impenetrable 256 bit AES encryption securing the traffic through the EST4, including emails and communication with fire operation centres.  At SSA Integrate are ready for migration from EST3 to EST4 without changes of field component, with minimising financial impact.

 

Conclusion 

In today’s connected world, the variety of available devices offers numerous points of entry for cyberattacks. Now is the time for software developers and manufacturers to understand a system's vulnerabilities and to harden their product against cyberattacks. Verifying that alarm systems meet appropriate standards can help ensure the performance and reliability of a product’s software to decrease downtime and mitigate cyber risks. A safety system with a firewall is the most viable solution for this problem. A firewall is a comprehensive cybersecurity solution able to protect a fire alarm system and its IT infrastructure from unauthorized access.

If your Fire Alarm connect with IoT devices / Internet, then only your FACP is get entry for cyberattacks. If your FACP use as standalone basis or not connected with Internet any more than your FACP is completely safe for cyberattacks. In India most of FACP not connect with Internet so it’s safe from cyberattacks. Lots of customer having Control remotely Like: Two EST3 panel are in Kolkata, One EST3x in Bangalore & one EST3 in Delhi, Customer control via FireWorks all panel from Kolkata, in this case you must consider cyber security part for your estimate organization. Responsible System Integrator or OEM can’t offer you cyber vulnerable product.


Thursday, July 1, 2021

Smoke Detector Testing

Smoke Detector Testing 

Requirements for testing of smoke detectors vary by country, the common need is for a functional test where smoke, or simulated smoke, is introduced through the vents of the detector to the sensor.

Functional testing is required by all national standards around the world, including BS: 5839, DIN 14675 and NFPA 72. BS:5839-1 which, at its last update, stated: “Multi-sensor fire detectors should be physically tested by a method that confirms that products of combustion in the vicinity of the detector can reach the sensors and that the appropriate response is confirmed at CIE.” (45.4(j).  It highlights that each sensor on which a fire detection decision depends (e.g. smoke, heat, CO) should be physically tested individually. This means that functional testing needs to be carried out on both the smoke and heat sensors, this ultimately requires spending more time under each detector and on a site where multi-sensors are the dominant device, this can add significant time to a site visit.  In this situation access to an all-in-one test solution adds real value, not only does it mean less time spent changing between testers but it also means less tools are required to be carried around site – reducing disruption and improving productivity.

A functional test should be carried out using an appropriate test tool which is designed for purpose and will cause no damage to the detector under test.

If you have standalone smoke detector, test the alarm monthly. Replace the batteries at least once every year. Replace the entire smoke alarm every 10 years. Press and hold the test button on the smoke detector. It can take a few seconds to begin, but a loud, ear-piercing siren should emanate from the smoke detector while the button is pressed. If the sound is weak or non-existent, replace your batteries. Most of Standalone detectors have either a blinking or a solid light that glows to let you know that the alarm is getting power. 

Before starting the testing job for 2wire / 4wire smoke detector, take the proper work permit and inform to all the respective departments / authority. Then do force the respective logics or interlocks if any (like fire suppression systems activation etc).

§  Prior to testing of Smoke detector see the LED status of the Smoke Detector it should be blinking red.

§  Check the voltage of the Smoke Detector, it should be + 30 Volts DC. This can be checked at the addressable base of the detector.

§  Now Smoke Detector is healthy and it is ready for testing.

§  Clean the Smoke Detector’s dust by cotton cloth and blower

§  Apply the aerosol spray to the Smoke Detector by solo Smoke detecting gun with the help of the Solo A10S/A5 aerosol bottle.

§  Keep applying aerosol spray for 10 seconds.

§  After 10 seconds LED status of the Smoke detector will change from the steady blinking red to steady red and after that alarm appears and hooter is activated on the fire alarm panel.

§  To silence the hooter press acknowledge key on the Fire Alarm Panel.

§  After alarm appears remove Smoke detecting test gun from Smoke Detector.

§  Note down the alarm tag and descriptions from the HMI or workstation. The alarm details must match with the smoke detector tag number and installed location.

§  Confirm the smoke detector activation status from the respective graphics page. You have to visually identify the colour change signals of the respective smoke detector on the graphics.

§  Reset the alarm of the Smoke detector from Fire Alarm Panel.

§  The LED status will change from steady red to blinking red.

§  Smoke Detector is now working normally.

§  Repeat the above procedure for all the remaining smoke detectors.

§  Normalize the forced interlocks or logics if any.

§  Close the work permit.

Note: The mentioned voltages or LED colors sequence may change as per the vendor or model of the smoke detectors. Solo Smoke Aerosols is approved all over the world, its Non-toxic & Silicone free. Solo smoke aerosols (used with the Solo 330/332 dispensers) deliver smoke particles to the detector under test replicating the conditions of smoke from a fire. Our range of smoke aerosols has recently increased to allow continued use of Solo 330/332 dispensers in full compliance with latest regulations.

BS:5839-1 as the example once again, the 2017 update to the standard covered this by stating: “For remotely situated or hard-to-access detection equipment, consideration needs to be given to the feasibility of testing and maintenance at the design stage.” (Clause 22.1).

Unique Formula Identifier (UFI), is a 16 character alphanumeric code which will soon be required to appear on the labelling of all products classified as hazardous by the ECHA. This new directive is designed to enable faster identification of product contents, with the UFI code used to detail the composition, product category and toxicological information of the product and enable faster reaction and treatment of potential harm.

UFI codes will become mandatory on relevant products across Europe from January 2021.

Do remember A10S is globally approved non-flammable UL listed product.