MARCH 2019CIOAPPLICATIONS.COM9common network will rise. Applying proper cybersecurity principles to protect all network traffic should increase proportionately. Leaders should also consider a backup channel to move critical traffic if circumstances arise.· WirelessIndustrial manufacturing has been slow to adopt wireless technology and applications. This is primarily due to denial of service attacks that can take place when a wireless signal is compromised. Proper site RF mapping to provide appropriate coverage is key to thwarting such attacks. For the industrial control system (ICS) world, wireless is best used in non-critical control situations, where intentional or unintentional outages don't carry a large impact.· 5GAs 5G opens up bandwidth, it will be an attractive target for hackers. While many of the safeguards will be borne by signal providers, users will also be responsible for understanding how 5Galters the threatscape. Be sure to take precautions to encrypt traffic: Only move data that requires movement and always authenticate data before trusting it. Edge computingFor industrial operations, edge computing can now run traditional applications in the control layer and extend connectivity to any range of devices, including virtual space. This gives plants the opportunity to create smarter assets, which means giving them certain levels of control capability so they can autonomously improve their own real-time safety, efficiency, reliability, environmental impact and even profitability. However, all these assets must be secure to ensure the operation is protected.The attractiveness of edge device computing does not change the base requirement of providing a robust, cybersecure solution. Unique challenges with edge include the misconception that just because a device is small and/or obscure, it is exempt from having to be cyber-secure. Crippling these devices with weak encryption, hard-coded backdoors and other security traps is the result of poor implementation and the lack of a dynamic security policy. Steer clear of any edge device that isn't capable of protecting against edge-based attack vectors. The world's critical infrastructure depends upon this. In addition, edge devices still carry security responsibilities, such as authentication and authorization, and must demonstrate they can resist attacks and preserve availability, integrity and confidentiality.CloudWhile cloud computing provides business agility, organizations should be very cautious when selecting a provider. Many assume their cloud service is delivered securely, but experiences with cloud providers are commonly just the opposite: IT professionals must develop a customized authentication and authorization strategy, information strategy, endpoint protection scheme and networking strategy, just as if the organization owned the physical platform elements.VirtualizationFrom on-site hosting cloud/fog services to the ever-expanding cloud, virtualization has become the expected course of action. In the industrial world, we'll start to see unique ways to break applications apart into smaller service components (containers) and lighten the footprint of the entire computing platform.Conversely, virtualization carries inherent hazards. Because it uses a concentration of applications to share common compute and communication resources, special attention needs to be paid to ensure hypervisory layers are hardened against attack. Organizations must tighten access controls surrounding the core operating system (OS), pay careful attention to the timely application of patches and use secure boot techniques to lessen the chances of a compromised core OS.AnalyticsThe increase in raw compute power and the ability to gather data into huge repositories opens the potential of AI-driven analytics and amplifies traditional analytics. While this enables operators to become real-time business decision makers, organizations must also ensure they're meeting the special cybersecurity needs for analytics. Data lakes, which are concentrations of large amounts of data, feed analytical engines. The integrity of the data is paramount to the effectiveness of the analytics. Applying data integrity mechanisms from the field device through the analytics engine is critical to ensure the decisions being driven by these engines can be trusted.SummaryAs technology continues to open more possibilities for industrial manufactures to succeed, cybersecurity must be a top priority. While it is up to everyone to ensure strong security, IT professionals play a key role in helping all business stakeholders apply and maintain safeguards, ensure industry cybersecurity standards are being implemented and adhered to, and making security part of the operational lifecycle. Because attack vectors will continue to expand as industry continues to digitize, there must be heightened focus, discipline and vigilance when it comes to cybersecurity. It must be a part of the operational lifecycle of all technology within organizations and cannot be viewed as a one-off project. Attacks on industrial control systems in the era of IIoT are escalating, and they extend across industries, geographies and broader society. We must continue to evolve our cyber-defenses to ensure our assets, operations and people are continually protected as the technological landscape evolves.
<
Page 8 |
Page 10 >