July/August 2022, Industrial Ethernet Book

Page 14

Industrial Edge

The price of network transparency Convergence of information technologies (IT) and operational technologies (OT) has led to new cybersecurity challenges. Integrating IT and OT to achieve greater flexibility and visibility on the shop floor has turned proven cybersecurity strategies on their head, leaving major security vulnerabilities. SOURCE: ISTOCK

CYBER DEFENSES LIKE NETWORK ISOLATION, a strategy to keep OT systems physically and electronically separated, and security through obscurity (STO), which enforces secrecy and confidentiality within IT systems, are losing their defensive foothold against cyberattacks.

Current security challenges

Securing devices and infrastructure after they’ve already been implemented is an arduous and costly undertaking, impeding the adoption of better security measures. And, because the IT/OT convergence is exposing network vulnerabilities, increased isolation and obscurity will not solve the problem at its source. Anyone, even an employee, could inadvertently install compromised devices and USB sticks with malware to make it past firewalls. Additionally, although field devices that bridge on-premises networks and machinery to the cloud are beneficial, they also carry cyberattack risks. In short, new network security countermeasures are required to meet the growing threat of cyberattacks while still maintaining the openness of IT/OT integration.

Current regulatory efforts

To regulate cybersecurity for field devices, the International Electrotechnical Commission (IEC) developed the IEC 62443 standard, which has 14 components and considers the entire automation system supply chain. Many plant operators now require their suppliers to adhere to IEC 62443 when developing and manufacturing their field devices.

New network security countermeasures are required to meet the growing threat of cyberattacks while still maintaining the openness of IT/OT integration. Hardware and software solutions can alleviate these security growing pains with modern security already in place. Manufacturers that adopt IEC 62443 early and incorporate IEC 62443-compliant features into their devices will be ahead of the curve as the rest of the industry catches up.

Security hardware/software

Installing devices with built-in security functions will make IT/OT integration easier and safer, and facilitate the addition of more advanced security functions later on. Look for security-hardened solutions with advanced features like a system on a chip (SoC) with

Secure Boot to verify firmware integrity before completely booting up. Implement protocol firmware such as Ethernet/IP with CIP Security or PROFINET Security to ensure secure communications at the field level. And, proven technologies like Transport Layer Security (TLS) offer device and user authentication data integrity as well as IO-data encryption. The flexibility and power to future-proof your infrastructure in this way will be an invaluable advantage. Technology report by Hilscher. Visit Website

Future-proof your secure networks Hilscher says that the netX 90 is the smallest industrial communication chip on the market with advanced, out-of-the-box security features like CIP Security as protocol stack firmware and Secure Boot functionality. This system on a chip (SoC) provides industrial real-time Ethernet to connected devices, while its state-of-the-art crypto core enables complex cryptographic algorithms without sacrificing performance. A robust controller, the netX 90 is compatible with many protocols like PROFINET, EtherNet/IP, EtherCAT, Modbus TCP, CC-Link IE FB and Sercos III. It is also ideal for reliably transferring process data between devices and their controllers, without the risk of third-party manipulation.

14

in d u s t r ial et h er ne t b o o k

08.2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

New Products

11min
pages 66-70

Effective control systems key to nationwide equipment network

13min
pages 59-62

CC-Link IE network keeps power on track at Euston Station

4min
pages 63-64

Simplified development for real-time Industrial Edge systems

3min
page 65

Powerful, open control automation for “Baumkuchen 4.0” bakery

8min
pages 56-58

OPC UA for the Field Level: UA FX multi-vendor demo

9min
pages 29-33

Mapping CIP to OPC UA: companion specification update

14min
pages 38-43

Commissioning cabling infrastructure for OT networks

17min
pages 46-49

Single Common Conformance Test Plan: IEC/IEEE 60802 TSN

4min
page 37

EtherNet/IP focus on digitization and process applications

11min
pages 34-36

Process applications framework using CIP technologies

23min
pages 50-55

12 time-tested principles for architecting EtherNet/IP systems

7min
pages 44-45

How Wi-Fi 6/6E enables Industry 4.0

5min
pages 27-28

The price of network transparency

2min
page 14

Intelligence at the Edge: boost productivity and improve costs

9min
pages 20-21

Getting IIoT networks ready for the future

5min
pages 24-25

Edge computing for easily implementing IoT applications

6min
pages 17-19

Industrial Edge ecosystem offers connectivity solutions

5min
pages 15-16

Industry news

6min
pages 4-5

Standardising data collection in breweries

3min
page 26

5 ways smart factory analytics bridge data & communication silos

7min
pages 22-23
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.