IT in Manufacturing


Secure boundaries enhance industrial cybersecurity

September 2021 IT in Manufacturing

The rise of interconnected OT and IT systems is often attributed to how business models have evolved with the purpose of enhancing operational efficiency. For example, scada networks deployed along oil pipelines now collect oil output data that is essential to billing and pricing systems. This increase in data collection allows companies to predict, with higher levels of accuracy, not only levels of oil production and output, but also expected revenue. However, it should be noted that the downside of such systems is the likelihood of introducing cybersecurity threats to OT systems.

What is compounding this complex issue is that ransomware attacks are increasing in their severity, according to the general manager of IDC Taiwan. With more and more security incidents occurring in OT systems, business owners and regulators are keen to seek solutions that enhance industrial cybersecurity and allow businesses to keep functioning normally.

What is the security boundary concept?

When enhancing cybersecurity, it is important to understand how industrial systems are exchanging data and how they connect to IT-level systems. In the ideal scenario, when traffic crosses different systems there should be boundaries in place between each system to ensure the traffic has good cyber-hygiene, even if it is authenticated and authorised. However, it is challenging and often unrealistic to build boundaries between every system, as it involves significant expenditure and often has a detrimental effect on the efficiency of network communications. For these reasons it is highly recommended to divide OT systems into different digital zones and build up the boundaries to find the right balance between expenditure and acceptable levels of risk.

The defence-in-depth approach, which is recommended by the IEC 62443 cybersecurity standard committee, is widely used across industries and has a good track record of helping build up multiple layers of protection to fulfil operational requirements. In Figure 1 below, the critical assets and operations are shown as the most important. Since they perform vital roles for the business, it is wise to take additional security precautions such as adding more layers of protection, to secure them even further.

Network segmentation: how to build security boundaries

Physical layer segmentation

This is known as air gapping, where two networks are physically isolated. When the operations and security of one system needs to be independently maintained, an air gap is a potential solution. However, as mentioned earlier, it is increasingly difficult to arrange networks this way due to business and operational requirements.

Data link/network (Layer 2/Layer 3) segmentation

As industrial control systems may have been built decades ago, one of the key challenges is to leverage existing infrastructure. One approach that is frequently deployed is to segregate traffic between different network segments using a VLAN, which is one of the functions of managed Ethernet switches. An alternative is to deploy firewalls to protect industrial applications and data, especially when you need to deal with traffic on Layer 2 and Layer 3 networks.

Layer 4-7 network segmentation

Further segmentation can be applied through deep packet inspection (DPI). DPI offers granular control over network traffic and helps filter industrial protocols based on the requirements of the application. When you have multiple devices on the same network, they can all communicate with each other. However, there are certain scenarios, when, for example, Controller A should only communicate with Robotic Arm B at a specific time. DPI technology can thus help engineers to define which controllers can perform read/write commands, or even the direction of traffic.

Secure remote access

According to cybersecurity experts, remote desktop protocols are sometimes exploited to spread malware or conduct unauthorised activity. As remote connections have become more prevalent, it is unsurprising that building security boundaries between two field sites is being talked about more frequently. It is highly recommended to build VPN tunnels and ensure that access control mechanisms are properly maintained.

As business owners are no longer able to enjoy the benefits and security of completely air-gapped networks, it is imperative to enhance security boundaries through different approaches, including network segmentation and secure remote access. Moxa’s newly launched EDR-G9010 series – an all-in-one firewall/VPN/switch/router – enhances cybersecurity while allowing business owners to leverage existing network infrastructure through future-proof investment.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Development of motor control units for automotive industry
Siemens South Africa IT in Manufacturing
SEDEMAC has adopted the Siemens Xcelerator portfolio of industry software, which is used in the development of its motor control units and engine control units. The motor control units are used in EVs, hybrids, ebikes and power tools, while the engine control units are used for off-road and on-road engines.

Read more...
Cybersecurity and cyber resilience – the integrated components of a robust cyber risk management strategy
IT in Manufacturing
Organisations continuously face numerous cyberthreats in today’s digital landscape, and while many prioritise cybersecurity to safeguard digital assets, their strategies for cyber resilience often become neglected.

Read more...
Sustainable last-mile delivery electric trucks
Siemens South Africa IT in Manufacturing
Workhorse Group, an American technology company focused on pioneering the transition to zero-emission commercial vehicles, has adopted the Siemens Xcelerator portfolio of industrial software as it builds electric trucks for sustainable last-mile delivery.

Read more...
South Africa’s role in the AGI revolution
IT in Manufacturing
AI has found its way into general conversation after the emergence of large language models like ChatGPT. However, the discussion is increasingly turning to the search for Artificial General Intelligence (AGI), which could entirely change the game.

Read more...
Predictive asset performance management with ABB Ability Genix
ABB South Africa IT in Manufacturing
The ABB Ability Genix APM suite is a comprehensive asset management platform powered by AI, IIoT and model-based predictive data analytics. This enables a paradigm shift towards a more proactive and predictive asset management approach.

Read more...
Intelligent automation primed for $47 billion revenue by 2030
IT in Manufacturing
According to GlobalData, the intelligent automation market is set to grow from $18 billion in 2023 to $47 billion in 2030, driven by advancements in AI, particularly the rapid adoption of generative AI.

Read more...
Chocolate manufacturing with Siemens Xcelerator
Siemens South Africa IT in Manufacturing
Freybadi, one of the largest chocolate manufacturers in Indonesia and a trusted supplier of chocolate in the Asia-Pacific, Middle East and African regions, has adopted the Siemens Xcelerator portfolio of industry software to optimise its manufacturing and production processes.

Read more...
Connecting every transport node
RJ Connect Editor's Choice Data Acquisition & Telemetry
Stockholm's bus system strategically links urban mainline, suburban mainline, non-mainline routes, community service buses and night buses. To acquire and process data from multiple sources and analyse onboard information on their moving buses, Transdev sought a dependable and powerful onboard computer. It teamed up with CatAB, Moxa’s local representative, known for delivering top-notch industrial data communication boards and equipment since 1988.

Read more...
A CFO’s guide to unlocking the potential of gen AI
IT in Manufacturing
CFOs of leading global organisations understand that their role extends beyond mere financial oversight; they are pivotal in steering organisation-wide transformation, particularly in the realm of technological advancement.

Read more...
Higher level cybersecurity certification for Schneider Electric
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s EcoStruxure IT NMC3 platform has obtained a new and higher level of cybersecurity certification, making it the first data centre infrastructure management network card to achieve SL2) designation from IEC.

Read more...