Stop Guessing Which Hazard Study You Need

Take the Free Assessment Now →
Editorial ArchiveSmart ManufacturingSmart Manufacturing

Secure Manufacturing: Tips For Effectively Protecting Operational Technology

By Jalal Bouhdada, founder and CEO of Applied Risk

Listen to this article
By Jalal Bouhdada, founder and CEO of Applied Risk
By Jalal Bouhdada, founder and CEO of Applied Risk

Technological developments such as the Industrial Internet of Things and 5G are increasingly bringing connected devices and sensors into manufacturing environments. Yet as industrial businesses ramp up their investment into systems that incorporate connected devices, many of them are opening the door to functional safety, environmental and cyber security breaches.

The manufacturing industry has been hit by a number of cyber-attacks in recent years. Last month, German manufacturer Pilz was victim of a ransomware attack that meant its systems were down for more than a week.

This summer in the US, the National Association of Manufacturers (NAM) identified suspicious activity relating to company systems which they believe came from an attack from foreign nation state.

Operational Technology (OT) cyber security controls

To mitigate cyber security threats like this, organisations must start by implementing strong Operational Technology (OT) cyber security controls, by combining prevention, detection and response tactics to safeguard critical OT systems and valuable intellectual property.

Despite the warning signs, we have seen many manufacturing businesses are still not following the most basic cyber security measures. This indicates a lack in the awareness of how severe the impact of a security incident in this sector can be.

In most factories that are being retrofitted with real-time remote sensing and analytics, not enough attention is being paid to the secure implementation of systems and devices already lacking basic security measures.

The potential dangers need be taken more seriously, and this must filter through all areas of the company. Perhaps, cyber security isn’t considered often enough in the manufacturing world because of its complexities, implementing effective processes may seem difficult.

By their very nature, industrial environments are complicated, and a large proportion of the security risks come from the fact that machines which were designed to be deployed in closed networks are now being connected to open IT systems.

The additional risks that may result from this, can effectively be assessed and mitigated if suppliers and end users work together to investigate the security of legacy and new connected devices.

Protecting operational technology

Basic security requirements

The following six basic security requirements are recommended when designing and implementing IIoT connected devices:

Secure interface

It is essential to understand a device’s architecture and review its associated interfaces, software and hardware, for vulnerabilities.

Software/firmware integrity

It is crucial that IIoT devices first and foremost have the ability to perform updates regularly while maintaining cryptographic checks from a trusted source.

Access control

Firms must review the various access controls to determine whether a device allows for the separation of roles, strong passwords and the sufficient protection of credentials.

Network services

Product manufacturers should ensure only necessary ports are available and exposed.

Backdoors

An IIoT device should not have undocumented functions or hidden entry points that can be easily exploited by the device vendor or any other third parties.

Security configuration

An attacker will often utilise the lack of granular permissions to access data or controls on a device. Manufacturers must scrutinise devices for sufficient security hardening by restricting user privileges.

While there have been few substantiated reports of major attacks in manufacturing plants when compared with breaches in corporate data, that doesn’t mean they aren’t already happening undetected.

The concern is that the lack of major headlines, when compared to consumer and corporate data breaches, is actually feeding complacency around the issue. Yet, as we saw in IT, many firms are unaware that their OT networks have been breached, since there’s a general lack of monitoring.

The time to get this right is now, not just to mitigate the threat of cyberattacks, but also to allow manufacturing firms the opportunity for enhanced intelligence and streamlined operations, all with minimal cyber security risks.

There are also many lessons that the manufacturing industry can learn from other industries. Techniques that are routinely deployed on corporate networks to identify and quarantine anomalous behaviours – identifying attacks early, in other words – must be developed.

Secure manufaturing

OT security recommendations

Fortunately, the most common issues we have encountered in our investigations are relatively easy to tackle. Addressing the OT security challenges that continue to put operations, and consequently, business at risk are essential. Here are our recommendations:

Governance

Make sure it is clear who is responsible for managing and maintaining the cyber security. By making this the primary task of a number of employees, you can be sure that someone is always working on the protection of your systems.

Cyber security is a continuous process: continuous vigilance is necessary – a powerful argument for investing in the professional execution and tracking of your cybersecurity. As well as continuous monitoring, it is important to also have an action plan in place in the event of a cyber-attack.

Secure by design

Make sure the system is ‘Secure by Design'. Cyber security must be part of the design and procurement of a system, up to and including the end of its lifespan. The Systems Development Life Cycle (SDLC) principles have proven to provide a reliable method that can be used to develop your systems safely.

Cyber security hygiene

As with an industry, good cyber security starts with the basics. That means simple things like ensuring good password policy for all users (on-site and remote), administrators and the IIoT devices themselves, where standards of practice still fall short. It continues with asset audits and ensuring that proper network segregation is used to protect vulnerable parts of the infrastructure.

Supply chain

It is essential that you not only look at your own company, but also to suppliers and other partners. You can have your business in order, but do those you work adhere to the same standards? Be critical and set the bar high. Re-evaluating the entire supply chain and ensuring that business partners thoroughly understand the OT environment and its cyber security risks is essential.

Continuously test

Make sure cyber security is tested on a regular basis. We find fire exercises very normal; that should also apply to the practice of a cyber-attack. Let professional hackers try to invade your system and practice the next steps – involve your suppliers here too.

KPIs

Cyber security (and the potential risks) is not only the management's concern. Every employee, at every level in the company, must be aware of the hazards and the points of attention. Develop an awareness-raising culture and set it mandatory for all employees. It is not a crazy idea to link the program to Key Performance Indicators.

Urgency

Fortunately, the importance of cyber security is becoming increasingly acknowledged, but not everyone is taking the measures that are involved seriously enough. Now that more and more new capabilities are emerging for threat actors, digital security needs to be prioritized. By following these steps, you can make things much harder for cyber criminals.

Show More

    Would you like further information about this article?

    Add your details below and we'll be in touch ASAP!


    Input this code: captcha

    Jalal Bouhdada

    Founder & CEO of Applied Risk B.V.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Back to top button

    Join 25,000 process industry specialists and subscribe to:

    PII has a global network of suppliers ready to help...