Industrial Edge
Industrial Edge: remote access methods and security
SOURCE: TTTECH INDUSTRIAL
Remote access to assets at the industrial edge iimproves flexibility for many workflows in diagnostics and maintenance. This was true before the pandemic, but it has become even more relevant now. And just like remote working in general, we expect the trend towards more flexible remote access to continue.
As digitalization and connectivity in manufacturing increases, secure remote access to industrial assets is becoming more important. REMOTE ACCESS TO RESOURCES OVER THE internet is an everyday experience for all of us. We use a web browser or similar technology to search for information or buy goods online many times every day, often without thinking about the amazing technologies and distances that are involved. This is especially true in the times of COVID-19 and the sudden increase in working from home, where the need for remote access to company resources from outside the company network through a VPN, via RDP or some other interface has become ubiquitous. 07.202 1
That is not yet true to the same degree for remote access to industrial automation equipment and assets on the shop floor. The operator will usually be close to the machinery to access HMIs and panels, even if the interaction itself would not require this physical proximity. In this article, we are considering various use cases and methods for remote access to the industrial edge and OT equipment. As this article happens to coincide with the largest and most severe wave of cybercriminality against industrial systems
i n d u str i a l e th e r n e t b o o k
and critical infrastructure so far, security considerations which need to have high priority for industrial automation related technologies and solutions anyway now become a truly predominant issue. We will therefore discuss various methods for remote access, their benefits and restrictions, and also highlight security-related aspects.
Abundant remote access targets
Assets at the industrial edge can come in many sizes and performance ranges, and this is reflected in the various methods for
17