Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

How to implement layered industrial cybersecurity in volatile times

  • Luis Narvaez
  • May 23, 2022
Courtesy: Brett Sayles
Courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

Industrial Internet of Things (IIoT) systems and Industry 4.0 have been touted as the key to next-generation productivity. In a rapidly digitizing business environment, taking advantage of the most efficient and powerful technologies is a requirement to stay competitive.

But here is the drawback: As digitalization offers increased connectivity, it also can expose networks to cyber threats, leaving critical manufacturing, infrastructure and transportation hardware or software with functionality exposed to public or private networks. The more exposure and points of access there are, the more avenues there are for malicious actors.

The current volatile world environment contributes to the risk, with malware designed to target industrial infrastructure and hardware being deployed as part of the Russian war in Ukraine. These state-sponsored malware threats may initially be isolated to targets dictated by the country that created them, but once used these vulnerabilities become known and the malware spreads to other bad actors.

Cyberattacks are more than a major financial risk, they can also affect future business. There is a significant risk to a company’s reputation. Competitors can use the attack as a selling point against you, customers may lose trust and investors can lose confidence. A remote takeover or unplanned shutdown due to an attack can also have knock-on effects such as environmental or logistical issues that could take months to resolve.

Industrial defense in depth

With the increase in risk and attack frequency, completely protecting industrial hardware and systems from cyber threats is more critical than ever. Comprehensive protection does not mean a single solution or procedure. It is a layered approach intended to blunt attacks at three levels: physical, network and systemic. With ‘defense in depth’ (DID), protection is broad in scope and layered (in depth). DID ensures multiple layers of security, protecting a facility and its assets even if one layer is breached.

  • Plant Security: Methods and procedures to prevent unauthorized persons from gaining physical access to critical components or systems. A key focus is determining what personnel, devices and information are granted access into and out of a key area, including adopting procedural changes to processes and policies.
  • Network Security: Securing networks and limiting network and port access to verified and trusted devices that are supposed to transmit data.
  • System Integrity: Designing automation systems and machines with integrated cybersecurity protections for control components.

Only by implementing both all-around and in-depth protection can a company truly secure industrial operations. Fortunately, there are tools and best practices to achieve each of these and to help you mount a strong, layered defense against cyberattacks.

Defensive layers

Mitigating the risk of cyberattacks cannot be an afterthought; it has to be an integral part of business processes, software and machine design. Industrial cybersecurity is unique because the stakes are substantial, and industrial systems are high-value targets for malicious actors. There is risk to individual machines, to the facility and to the business. There is an even more serious risk to life in some cases. Creating a cyber-risk taskforce that includes stakeholders at all levels of the business can help devise a layered defense that encompasses software, hardware and key business processes.

Physical security is probably the most familiar to everyone, but it is still one of the most critical aspects of securing systems from attack. Maintaining control of the plant’s physical boundaries is important, but that is not just putting a lock on the front door. Physical security starts with conventional building access and extends to the securing of sensitive areas in zones. This is based on who needs access and the risks associated with certain areas or equipment, including ensuring all approved users develop the skills and methods for connecting devices securely and maintaining security protocols. Comprehensive plant protection requires risk analysis, the implementation and monitoring of suitable measures, and regular updates through an ongoing analysis and implementation process.

Network security is focused on protecting networks against unauthorized access. A key challenge for integrated Industry 4.0 communication between machines and outside of the facility is to additionally establish adequate protection of these open source, easily accessible systems. This includes the monitoring of all interfaces such as between office and industrial networks or remote maintenance access to the internet.

Monitoring and security of networks is accomplished through firewalls and, if applicable, by establishing a secured and protected “demilitarized zone” (DMZ). The DMZ is used for making data available to other networks without granting direct access to the automation network itself. This segmentation of the plant network into individually protected network cells minimizes risks and increases security.

Making cybersecurity a priority

System-level security leverages integrated security features, tools within PLCs (programmable logic controllers) and other components within the industrial control system (ICS). Protection of automation systems and control components excludes unauthorized access to someone’s automation processes from the outset as a way of preventing faults in production and protecting existing know-how.

For example, people can bind individual program blocks to the PLCs serial number or memory card, protecting R&D investments against unauthorized duplication of PLC programs. This prevents the duplication of projects and makes it possible to detect manipulation attempts. Implementing targeted measures to protect against a variety of threats is part of designing complete solutions. System-level security is a last line of defense, designed into the hardware itself, providing protection even when the physical or network security has been breached.

A normal cybersecurity environment full of risk, the attacks being perpetrated by malicious actors over the last month, and the new tools and attack vectors they are employing make industrial cybersecurity a critical priority for any business operating industrial hardware, automation or networks, whether in light manufacturing, utility services or any other industrial application.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Luis Narvaez

Luis Narvaez is the U.S. Product Manager for SIMATIC PLCs and Industrial Security at Siemens Industry, Inc. He has a bachelor’s degree in electrical engineering from the University of Central Florida to complement over 10 years of automation experience serving a variety of markets, including construction, entertainment/theme park, discrete and process industries.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Threats & Vulnerabilities

Throwback Attack: DDoS attacks are born in the Big Ten

  • Gary Cohen
  • May 20, 2022
Read More
Next Article
  • Strategies

Will CISA recommend securing industrial control systems?

  • Dale Peterson
  • May 25, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT