search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
COVER STORY


ENHANCING INDUSTRIAL CYBERSECURITY WITH FLEXEDGE® Powered by Crimson®, Aligned with ISA/IEC 62443 Standards


Cybersecurity is a growing concern in industrial environments, where alignment with ISA/IEC 62443 standards is critical. A whitepaper from Red Lion explores how its FlexEdge, powered by Crimson 3.2, helps organisations meet these standards through key countermeasures, including logical access controls, data flow management, data integrity, policy enforcement, and system hardening


F


lexEdge, with its robust Crimson 3.2 software, offers tailored security features for industrial applications, such as secure login, role-based access, and remote authentication, aligning with logical access control requirements. It includes advanced data flow controls like VLANs and firewalls to manage network segmentation and secure data transmission. Data integrity is maintained through encryption and VPN support, safeguarding information from unauthorised access and modification. Controls engineers can align with IT policies like password expiration, ensuring consistent security practices across the network. Additionally, FlexEdge allows administrators to disable unused ports and services, reducing potential vulnerabilities.


12 NOVEMBER 2024 | PROCESS & CONTROL


By leveraging these features, organisations can align their industrial applications with ISA/IEC 62443, enhancing their cybersecurity posture against evolving threats.


INTRODUCTION TO ISA/IEC 62443 ISA/IEC 62443 is a series of standards that secure Industrial Automation and Control Systems (IACS) throughout their lifecycle, from design to decommissioning. What sets ISA/IEC 62443 apart is its adaptation of IT cybersecurity practices to industrial environments.


Key concepts include: • Principle of Least Access: Restricting user and device permissions to the minimum necessary, reducing potential damage from breaches. • Defence in Depth: Implementing multiple


layers of security controls, such as firewalls, encryption, and access controls, to protect critical assets even if one layer is compromised. • Zones and Conduits: Segmenting the network into secure zones with conduits controlling data flow between them, protecting sensitive data and limiting the spread of potential breaches. Red Lion’s FlexEdge supports these concepts, providing the necessary tools to implement a robust, ISA/IEC 62443-aligned cybersecurity posture.


ALIGNING RED LION FLEXEDGE WITH ISA/IEC 62443: COUNTERMEASURE BREAKDOWN


Logical Access Controls Overview: Logical access controls ensure


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48