Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • IIoT & Cloud

Ensuring IIoT cybersecurity best practices

  • Gregory Hale
  • September 6, 2019
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

Data is coming into manufacturers’ systems at unprecedented rates and while that will surely help organizations perform better and become more profitable, making sure information remains secure becomes more vital in the age of the Industrial Internet of Things (IIoT).

Protecting IIoT data becomes so critical to the point where an organization needs to fight off all types of internal and external attacks. That means understanding the entire scenario to be able to apply security measures to avoid serious consequences for IIoT systems like disruptions, safety incidents, loss of IP, regulatory fines, and negative impact on brand reputation. But the problem is, just where should a manufacturer begin this IIoT and security journey?

One piece of research is available from the Industrial Internet Consortium (IIC) which published the “Data Protection Best Practices White Paper,” designed for those involved in cybersecurity, privacy, and IIoT trustworthiness. The paper describes best practices that can be applied to protect various types of IIoT data and systems.

The 33-page paper covers multiple adjacent and overlapping data protection domains, for example data security, data integrity, data privacy, and data residency.

“One key takeaway is data protection is a team sport that involves multiple people and multiple stakeholders in the organization, and not just the security officer,” said Bassam Zarkout, executive vice president at IGnPower and one of the authors of the paper. “Maybe the security officer is leading the effort, but the concerns of the stakeholders expand across different domains and different functions across the organization.”

Trustworthiness and protecting IIoT data

Protecting IIoT data during the lifecycle of systems is a critical foundation of trustworthy systems.

“One observation we made is data leaks can lead to multiple consequences,” Zarkout said. “Not only one consequence. A data leak can lead to a data privacy issue as well as a data confidentiality issue. So the same data can be sensitive from a personal perspective and a business perspective. In that case, two sets of controls, requirements and processes need to be applied to protect the data and report on the issue and apply the corrected action.

“Data security is part of what we refer to as IIoT trustworthiness in the sense that you have IT and OT issues converging in the industrial world. Topics and issues related to security and privacy are no longer independent to issues related to safety, reliability and resilience,” Zarkout said.

Zarkout listed the five elements of trustworthiness:

  1. Security
  2. Privacy
  3. Safety
  4. Reliability
  5. Resilience

Zarkout said they all must operate in conformance with business and legal requirements with data protection a key enabler for compliance with these requirements.

In these days leading up to the IIoT, there is an understanding organizations need to be more digitally enabled, but they end up paralyzed because they don’t know where to start.

“There is a huge push to incorporate security into highly distributed systems, but oftentimes the discussion are deferred or we are not able to get the details we need because it is not clear where we should start,” said Niheer Patel, product manager at Real-Time Innovations (RTI) and another author of the paper. “This paper guides folks in how to start approaching security for their system. We have identified some key areas where there should be some level of attention or awareness of what the use case might be and how to address the use case.”

IIoT cybersecurity best practices

The paper covers best practices for various security aspects like authenticated encryption, key management, root of trust, access control, and audit and monitoring.

“It is important to look at access control because all this data is coming in from any place and it is coming in and being stored back in the cloud,” said Apurva Mohan, Industrial IoT security lead at Schlumberger, and the third author of the paper. “Access control and data encryption are a white flags and also how do we protect data in the cloud. One of the first questions a customer asked me was I get all the talk about security, but how are you going to protect data in transit and in the cloud? Those kinds of questions come up with educated customers, but there are others that don’t even understand the risks, so this paper will give them some insight into what data protection is and what should be done.”

IIoT is falling upon the industry like and early morning blanket of summer dew and there are some that are more advanced than others, but in the end this paper gives best practices and tips on how to get a security program up and running in the digital age.

It will also bring a better understanding of collaborating with everyone within the manufacturing enterprise. People will get an end-to-end view of how it all should work and connect.

“The expert in privacy will not learn anything new in the paper,” Zarkout said, “but the expert will learn how privacy works within a bigger topic in the organization.”

This content originally appeared on ISSSource.com. ISSSource is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media, cvavra@cfemedia.com.

See additional cybersecurity strategy stories including:

Five questions every CISO should ask about OT cybersecurity

Five questions every CISO should ask about OT cybersecurity

Compensating controls in ICS cybersecurity

Compensating controls in ICS cybersecurity

Original content can be found at isssource.com.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gregory Hale

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information website covering safety and security issues in the manufacturing automation sector.

Related Topics
  • ISS Source content
Previous Article
Robotics
  • Regulations

Improving cybersecurity in robotic automation

  • Robotic Industries Association (RIA)
  • May 19, 2019
Read More
Next Article
  • IIoT & Cloud

How to manage IoT cybersecurity

  • Gregory Hale
  • September 10, 2019
Read More
You May Also Like
Courtesy of CFE Media and Technology
Read More

Three risks to consider before taking your business’s accounting to the cloud

Courtesy: Brett Sayles
Read More

Technique offers faster security for non-volatile memory tech

Read More

How industrial control systems can be secure in the cloud

Image of IT/OT convergence on a control panel
Read More

New concepts to reduce the risk of ransomware in IIoT environments

Courtesy: CFE Media and Technology
Read More

How to mitigate cloud security threats

Read More

IoT security: The threat before us

Courtesy: EU Automation
Read More

Is your IoT network putting you at risk of cyberattack?

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

Securing cloud data is a challenge for many companies

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT