Internet of Things Q
How can Rockwell Automation help customers secure their operating infrastructure?
Modern industrial operations require modern cybersecurity. With our experience as an industry leader in industrial control systems, we have developed cybersecurity solutions built around the NIST framework to help other businesses achieve secure operating infrastructures. One of the reasons Rockwell uses the NIST framework is it allows us to put together a strategy for our customers to achieve a secure infrastructure based around NIST’s five pillars: Identify, Protect, Detect, Respond and Recover. The service we provide mitigates the skills gap that a lot of our customers face: it is rare to find engineers that are skilled in both automation and cybersecurity and whilst our customers may have very experienced control engineers, they don’t necessarily understand what they need to do to secure their infrastructure.
Q
What can a customer expect when they first approach Rockwell?
The Identify phase of NIST is very important when customers are starting out on their cyber security journey. A lot of the conversations we are having with customers today revolve around understanding assets and being able to identify the risks and vulnerabilities there are around those assets so they can start to plan what they can do to improve their security posture. As well as looking at asset inventories, we also identify what assets are talking to other assets and if
these assets are communicating directly with external IP addresses. We also ask customers to consider the lifecycle stage of their assets as, for example, a controller that is unpatched can leave control systems vulnerable to cyber issues.
Q
How can customers protect their operating systems when working with external vendors and service providers?
This is covered by the next NIST pillar: Protect. Rockwell takes many steps to ensure that we can work securely with our customers and we advise our customers to do the same. We ask customers to think carefully before granting external access to their sites and networks. Customers should consider who they are letting in and what they will have access to. They should think about who is granting the access and how the access is being granted. There is no single cyber security solution for
working with third-party vendors on an industrial site but we can work with our customers to identify the best way forward to help maintain their security posture. For example, we can help customers to have a well- designed network architecture, looking at not just north-south segmentation but also east-west segmentation so when that third party comes in to provide support on the processing line, for example, they cannot connect and see assets on the packaging line. Rockwell really gets to understand how customer’s factories are working and what their processes are before designing a secure network. As an organisation we have developed the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide in collaboration with Cisco Systems. CPwE helps manufacturers seeking to integrate or upgrade their Industrial Automation and
Control System networks to standard Ethernet and IP networking technologies. It mitigates risks by improving network uptime and equipment availability with superior security.
Q
There are new cyber threats all the time. How can Rockwell help?
This is why we talk about it not being a ‘start-to- end' journey – the threats change on a daily basis and by doing something proactive like by having continuous threat detection on your network, you are protecting your industrial control system. We provide real-time threat detection as a service for customers. We can tune the threat detection platform to get rid of noise and alerts for ‘normal behaviour’ so the information the customer receives is actionable and meaningful. Rockwell can also go one step further with Security Operations Center (SOC) as a Service. Rockwell's SOC as a Service lets customers outsource threat detection and incident response, streamlining security management from set up through reporting. Customers get around-the-clock monitoring and immediate access to top experts with no need to hire or train new personnel.
Q Q Instrumentation Monthly November 2022
Why have cyber security attacks on the industrial sector been on the rise?
Products used in the industrial sector tend to have a much longer lifespan that your typical IT product. We have products that have been in facilities for 25 years. Older industrial control systems were never designed with cyber security in mind - there was no need for it... it didn’t happen. However, the vulnerabilities in these aged assets are well known and this makes it easier for threat actors to strike upon those vulnerabilities. Obsolescence and understanding obsolescence should really be a significant part of any cyber security strategy. Having obsolete assets that are unpatched is a significant risk to any facility.
Do I need to be running a Rockwell industrial control system to benefit from your services?
Our services are completely vendor agnostic so if you would like to know more about securing your industrial control system, visit our website:
www.rockwellautomation.com.
Rockwell Automation
www.rockwellautomation.com
71
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82