SUPPLEMENT Industry 4.0 & Smart Factories
Accelerating Industry 4.0 Erik Halthen, Cyber Security Manager at Analog Devices, discusses extending the secure edge in industrial control systems C
yber security in industrial control systems (ICS) could delay the adoption of Industry 4.0. Since there are many factors contributing to cyber security complexity, business leaders fi nd it hard to understand the challenges. Furthermore, the engineers developing ICS solutions have likely not seen signifi cant cyber security requirements at the device level. To date, traditional methods for securing ICS have relied on limiting access to networks and devices, and monitoring network traffi c through IT. However, these methods are no longer suffi cient in the Industry 4.0 era. The very nature of Industry 4.0 is
to increase access and accessibility of control of the devices in the factory. This means increased access to the data to expand transparency, reduce network planning, lower CapEx, reduce OpEx, improve bandwidth and optimise machine interworking. This means devices will need to be security-hardened; identity and integrity will be at the core of every device in the fi eld to enable trusted data and secure operation.
Security implemention There are many diff erent standards in the industrial market that provide guidance on implementing security in ICS. Of these, the most predominant are NIST, which provides security guidance with US governance, and, IEC 62443, a security standard in draft form for the international market with governance in Europe. Both provide useful guidelines for implementing security and assessing one’s security posture for ICS, but they don’t provide guidance on how to accelerate
Enabling confidence where physical to digital conversion occurs
the adoption of Industry 4.0. IEC 62443 is currently lacking any guidelines for implementing security below the PLC, and an ISA99 working group has recently been established to address cyber security at the bottom layers of the factory within the IEC 62443 framework. Today, to meet an acceptable security posture of a system, countermeasures must be applied to devices that don’t reach a suffi cient level of security. These countermeasures typically rely on methods such as fi rewalls to limit access and section off or isolate vulnerable devices. In the future, devices will need to reach higher security levels to enable the transition to Industry 4.0.
Extending the ICS cyber security Analog Devices is in a unique position to extend the secure edge. Our traditional market space is at the physical edge, where the real world is translated into digital signals and data is created. This gives us the opportunity to establish trust in data by providing identity and integrity much earlier in the signal chain and establish a new defi nition of the secure edge. Traditionally, the secure edge has
originated at gateways, PLCs, or even servers in the ICS security framework. This view is reminiscent of the traditional IT cyber security view of the factory but it persists throughout the industry. The prospect of driving the secure edge lower in the signal chain is enticing because it enables higher confi dence in the decisions that are being made from that data. The earlier identity and integrity can be established in the signal chain, the more trust and confi dence can be placed in the data that is driving decisions. ICS cyber security cannot be addressed by a one size fi ts all solution and an in-depth defence approach must be adopted and applied based on the risk assessment of the system. Analog Devices has a strategy to extend the depth of ICS cyber security as Ethernet is adopted at the edge. Enabling Industry 4.0 requires the factory to adopt new connectivity methodologies. This means that Ethernet has taken, and will continue to take, a larger role in industrial control systems. Analog Devices’s security strategy is to focus on where there is Ethernet connectivity because this signifi cantly changes the impact any one device on the network has on the system. Our current family of industrial Ethernet and TSN solutions has been the focus of our security development. In the near term, the fi do5000, RapID platform that provides two-port, multi-protocol connectivity will be enabled with security features that provide key generation/ management and secure boot, update and memory access to protect against network bound attacks. The product family roadmap includes single-chip solutions that feature a hardware root of trust, tamper protection and secure device lifecycle management, and communications/mutual authentication.
Edge devices in Industry 4.0 applications
CONTACT:
Analog Devices Inc
www.analog.com
30 December/January 2021 | Automation
automationmagazine.co.uk
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46