We Need to Make Smart Manufacturing Safer With Better Cybersecurity

2023-01-17 04:31:53
关注

We Need to Make Smart Manufacturing Safer With Cybersecurity
Illustration: © IoT For All

Manufacturing cybersecurity cannot be an afterthought. These days, it seems easier to count the companies that haven’t been affected by cybercrime than the ones that have. A stunning 80 percent of firms that responded to Duke University’s 77th Global Business Outlook Survey said their networks had been breached for some nefarious end or another.

Whether to steal, tamper with, or ransom sensitive enterprise data, it’s all too easy for hackers to find and exploit unpatched security gaps in modern technology. When that happens to a small business like a contract manufacturer, in 10 percent of cases, that business isn’t able to recover and doesn’t open its doors again. Here’s what smart factory owners need to know about manufacturing cybersecurity.

'A stunning 80 percent of firms that responded to Duke University's 77th Global Business Outlook Survey said their networks had been breached for some nefarious end or another.' -Emily NewtonClick To Tweet

Where Do Manufacturing Threats Come From?

Smart manufacturing is defined by several technologies, all of which depend upon internet access to exchange data. Smart factories consist of tech that enables:

  • Predictive machine maintenance
  • Remote monitoring of processes
  • End-to-end process visibility
  • Automated quality control
  • Smart warehousing and organization
  • Predictive capabilities for demand and output
  • Remote resource management

This means there isn’t just one possible point of entry or failure bad actors can take advantage of in smart manufacturing. In fact, there’s a wide range of possible intrusion points, including back-office computers and traditional IT, data warehouses, operational technology (OT) like the Internet of Things (IoT), customized software, and legacy systems.

Actions Manufacturers Can Take

Culture needs to be a top priority as you assess the current threat landscape and take measures to protect your organization. Some of the following points are closely related to building a conscientious, safety-minded culture. This is done by educating the workforce on the current threat landscape regularly and instituting organized cybersecurity training.

Other manufacturing cybersecurity actions require some technological know-how, such as bifurcating industrial networks for data partitioning and achieving the best level of protection. Here are some steps worth taking to protect your smart factory.

Conduct a Risk Assessment Annually

Your business and its technology stack change regularly — so do cybersecurity threats. An annual cybersecurity risk analysis will reveal where to invest your efforts and where you might be able to eliminate wasted time or resources. The National Institute of Standards and Technology (NIST) has a series of free resources available so business owners and stakeholders can understand fundamental cybersecurity risks and how to take effective precautions.

Train New Employees and Retrain Veterans

It’s critical to prioritize cybersecurity awareness and preparedness in new employee onboarding. This must also be a recurring training topic for seasoned team members.

Why does manufacturing cybersecurity demand ongoing learning? Because protecting manufacturing assets requires vigilance. Workers must know what phishing attempts look like so they don’t hand over sensitive credentials in an email. Routine training and testing help ensure your team stays on its guard.

Ongoing learning is essential because the nature of the threat changes regularly. When hackers identify a vulnerable endpoint in a targeted network, they’re often able to exploit it in 15 minutes or less. Every workforce needs to know about the latest vulnerabilities and what actions to take to keep assets safe.

Create Separate Networks for Smart Technology

One of the most common and helpful pieces of advice you’ll receive about hardening a smart factory against outside interference is setting up separate networks for smart technology. In fact, this course of action is recommended by the FBI. If a criminal compromises one of your networks, it means they won’t be able to capture data from industrial IoT devices.

Back-office computers with client and payroll data shouldn’t run on the same network as industrial control devices. Hackers could desire payroll data as well as proprietary information from machine-tending software.

Understand How Service Providers Protect Themselves

Global commerce is in the grips of a technological arms race. IoT, inventory-tracking platforms, connected manufacturing equipment, and other tech breakthroughs bring performance and competitive enhancements. They also present risks stakeholders in smart factories need to understand.

APIs — application programming interfaces — are a primary tool with which manufacturers and other entities incorporate third-party telematics, tracking, and sensing hardware with their existing tech stacks. Unfortunately, APIs are so vulnerable to an attack that we’ve stopped counting which ones have been breached and now count which ones have not. In a report published in 2021, only 6 percent of surveyed companies reported no API-related cybersecurity problems in the previous year.

This is just one way in which a smart factory might become compromised. Still, manufacturers must understand how their third-party technology and digital service providers protect themselves and their infrastructure. Again, NIST provides resources — this time in the form of assessment and auditing considerations as you look at potential outside technology partners.

Implement Zero-Trust Architecture

Ultimately, the best thing manufacturers can do to maintain cybersecurity in smart factories is commit to zero-trust architecture. Zero-trust architecture combines several features:

  • Strong user-identity authentication
  • Least-privilege policies throughout the organization
  • Verifications for user-device integrity

The main benefit of zero-trust architecture is it assumes no single device or network access point is secure. It also awards access credentials only to parties requiring that level of access to complete their current objective.

Setting up zero-trust in the workplace is an important step to take not just because of the result, but also because it forces stakeholders to identify vulnerable processes and endpoints in the organization’s infrastructure. This will help prioritize which actions to take, determine which vendors may be susceptible, and inform which cybersecurity products to purchase.

Smart Manufacturing Cybersecurity Can’t Be an Afterthought

Smart manufacturing has been a major technological boon when it comes to meeting rising global demands. Manufacturers have more tools than ever for gathering and analyzing process data and making factories more efficient, but these tools also bring vulnerabilities. Understanding the risk types and how to protect one’s organization can’t be an afterthought — manufacturing cybersecurity needs to be a top priority every step of the way.

Tweet

Share

Share

Email

  • Cybersecurity
  • Automation
  • Industrial Automation
  • Industry 4.0
  • Manufacturing

  • Cybersecurity
  • Automation
  • Industrial Automation
  • Industry 4.0
  • Manufacturing

参考译文
我们需要用更好的网络安全让智能制造更安全
插图:© IoT For All 制造业的网络安全不能是事后考虑的问题。如今,似乎更容易数出未受网络犯罪影响的企业数量,而不是受影响的。在杜克大学第77次全球商业展望调查中,有令人震惊的80%受访企业表示,他们的网络曾遭受某种恶意目的的入侵。无论是为了窃取、篡改还是勒索敏感的企业数据,黑客总能轻易找到并利用现代技术中未修补的安全漏洞。当这种情况发生在一家小型企业,例如合同制造商身上时,10%的情况下,这家企业将无法恢复,再也无法重新开业。以下是智能工厂所有者需要了解的制造业网络安全要点。“在杜克大学第77次全球商业展望调查中,有令人震惊的80%受访企业表示,他们的网络曾遭受某种恶意目的的入侵。” ——艾米丽·牛顿 点击转发制造业威胁来自哪里?智能制造由多种技术构成,所有技术均依赖互联网来交换数据。智能工厂包含的技术包括:预测性设备维护远程过程监控端到端流程可视化自动化质量控制智能仓储和组织对需求和产量的预测能力远程资源管理这意味着在智能制造中,坏行为者可以利用的入侵点或故障点并不只有一个。事实上,存在着广泛的潜在入侵点,包括后台电脑和传统IT系统、数据仓库、操作技术(OT)如物联网(IoT)、定制软件以及旧系统。制造商可以采取的行动在评估当前威胁环境并采取措施保护组织的过程中,文化必须被列为首要任务。以下几点部分与建立有意识、注重安全的文化密切相关。这可以通过定期对员工进行当前威胁环境的教育,并实施系统的网络安全培训来实现。其他制造业网络安全行动则需要一定的技术知识,例如对工业网络进行分区以实现数据隔离,从而获得最佳保护。以下是值得采取的保护您智能工厂的步骤:每年进行一次风险评估您的业务及其技术栈会定期变化——网络安全威胁也是如此。年度网络安全风险分析将揭示您应投入努力的领域,以及您可以节省时间和资源的地方。美国国家标准与技术研究院(NIST)提供一系列免费资源,以便企业主和利益相关者了解基本的网络安全风险以及如何采取有效的预防措施。培训新员工并重新培训老员工在新员工入职过程中优先考虑网络安全意识和准备至关重要。这也必须是资深团队成员的定期培训主题。为什么制造业网络安全需要持续学习?因为保护制造资产需要警惕。员工必须知道钓鱼攻击的特征,以免在电子邮件中泄露敏感凭证。定期培训和测试有助于确保您的团队始终保持警惕。为智能技术创建独立网络您在提高智能工厂对外干扰的防护能力方面最常见且最有帮助的建议之一,就是为智能技术设置独立网络。实际上,FBI也推荐采取这个行动。如果犯罪分子入侵了您的一个网络,那么他们将无法从工业物联网设备中获取数据。包含客户和薪资数据的后台计算机不应与工业控制设备运行在同一个网络上。黑客可能既想要薪资数据,也可能想要来自机器管理软件的专有信息。了解服务提供商如何保护自己全球贸易正处于一场技术军备竞赛之中。物联网、库存追踪平台、联网制造设备以及其他技术突破带来了性能和竞争优势的提升。它们也带来了智能工厂利益相关者必须理解的风险。API(应用程序编程接口)是制造商及其他实体将第三方遥测、追踪和传感硬件集成到其现有技术栈中的主要工具。不幸的是,API极易受到攻击,以至于我们已经不再统计哪些API未被入侵,而是统计那些没有被入侵的。在2021年发布的一份报告中,只有6%的受访企业报告称,上一年度没有出现与API相关的网络安全问题。这只是智能工厂可能被入侵的一种方式。然而,制造商必须了解他们的第三方技术和数字服务提供商是如何保护他们及其基础设施的。再次强调,NIST提供了资源——这次是以评估和审计考虑因素的形式,供您在寻找潜在外部技术合作伙伴时参考。实施零信任架构最终,制造商为了在智能工厂中维持网络安全,最好的做法是承诺采用零信任架构。零信任架构结合了以下几个特点:强大的用户身份认证全组织范围的最小权限策略用户设备完整性验证零信任架构的主要优势在于它假设没有单一设备或网络接入点是安全的。它还只向需要该层级访问权限以完成当前目标的人员授予访问权限。在工作场所实施零信任架构不仅是因为其结果重要,还因为它迫使利益相关者识别组织基础设施中的脆弱流程和端点。这将有助于确定优先采取哪些行动、判断哪些供应商可能容易受到攻击,并决定购买哪些网络安全产品。智能制造的网络安全不能是事后考虑的问题在满足全球日益增长的需求方面,智能制造是一项重大的技术进步。制造商现在比以往任何时候都拥有更多的工具来收集和分析流程数据,使工厂更高效,但这些工具也带来了漏洞。理解风险类型以及如何保护自己的组织,不能是事后才考虑的问题——网络安全必须在智能制造的每一步都列为首要任务。推文分享分享电子邮件网络安全自动化工业自动化工业4.0制造业网络安全自动化工业自动化工业4.0制造业
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘