In less than a decade, Industry 4.0 has gone from a little-understood buzzword to a major part of nearly every modern manufacturer’s operations, one which may be worth USD 165.5 billion by 2026. Today, it seems obvious that high-tech manufacturing requires networked devices, robotics, and constant cyber-physical optimisation, so much so that it’s hard to see how we did without them.
However, manufacturing is far and away the industry vertical most likely to be targeted by a cyberattack – high-tech manufacturers working to strict just-in-time deadlines can’t afford to have their machines shut off by ransomware, so they are more likely to pay ransoms, and companies like OEMs may work with dozens of other companies, so one attack can infect equipment belonging to many organisations who could potentially pay ransoms. Perhaps the most damaging attacks may go unnoticed if the hackers are sufficiently skilled: stealing information from manufacturers is big business, with 20% of European companies suffering at least one breach.
The transition from old-style Fordist production lines to digital modern manufacturing operations has made this possible: a modern factory can have thousands of sensors and data connections, and any of these could potentially be compromised. Manufacturing companies must uphold the confidentiality of production and company data to maintain their competitive edge. Simultaneously, they are obligated to protect personal data in compliance with stringent data protection legislation, such as Europe’s GDPR, California’s CCPA, and Brazil’s LGPD. So, how can companies strike a balance between benefitting from Industry 4.0’s improved efficiency and data security?
On-premises data security
At a time when cloud computing is everywhere, security for a single location might seem quaint, but in the manufacturing space it is absolutely necessary. It is also an important cornerstone of cloud-connected organisations – each location needs to be secure on its own terms to prevent the wider cloud from being compromised.
Related to this is the concept of data being at rest and in transit. The plans for a new product could be stored on a hard drive, but could also be sent between departments, and there are significantly different security considerations with both.
Data at rest is inactive – a file stored on a hard drive that is not currently being used – and therefore is ‘locked’ behind the various security and encryption methods that a company might use. When an employee opens the file, they will need to exchange whatever cryptographic information is used to open that file, even if it is just a password, over the company’s internal network, where it could be intercepted, giving bad actors the credentials needed to open the file themselves. Of course, bad actors can steal encrypted data and break its encryption on their own machines, making the problem even more complex.
In many ways, data in transit is more vulnerable than data at rest, and a modern Internet of Things (IoT) manufacturing operation creates a lot of in-transit data, some of it highly valuable. Manufacturers need systems in which data is as secure in transit as it is at rest, and modern security architecture can provide this.
Securing IoT manufacturing
On-premises security can no longer take a walled garden approach, in which the perimeter of the site is secured but internal security is more lax. Sites are also being opened up and cloud services are used to centrally process and exchange data, so on-premises security paradoxically often needs to take off-premises, cloud-based security into account.
Companies need to take a holistic view of on-premises data security, the key element of which include:
- Software-based file and folder encryption: Implementing reliable data encryption at the file and folder level is essential to protect data against unauthorised access and meet data protection regulations. This approach ensures that only authorised personnel can access sensitive data, preventing data breaches.
- Key management: Encryption is only effective if the encryption keys are managed and stored securely. Proper key management ensures that sensitive data remains protected in transit, at rest, and during use, guaranteeing the highest level of data security.
- Secure file sharing: Manufacturers often need to collaborate with third parties and share data. Secure file-sharing solutions allow companies to exchange data without the risk of data interception, ensuring that confidential information remains confidential.
- Post quantum cryptography: With the looming threat of quantum computing, post-quantum cryptography offers strong, quantum-resistant cryptographic algorithms for encryption and digital signatures. This ensures that data remains secure even in the face of future technological advancements.
- Hardware Security Modules (HSMs) for general purpose use cases: HSMs enable key generation, storage, and exchange while meeting various performance and physical security requirements. They also play a crucial role in complying with regulatory mandates and industry-specific security standards.
- Tokenization: Tokenization replaces sensitive data with non-sensitive tokens, allowing secure business operations without the need to share confidential information. This approach safeguards personal and sensitive data while ensuring operational efficiency.
- Code and document signing: Code signing allows organisations to prove the trustworthiness of their software, and end users can verify the authenticity of files and programme code. This is essential for ensuring that only legitimate and unaltered software is utilised within manufacturing processes.
Because there is no one-size-fits-all solution for IoT-enabled manufacturing sites, there is no one-size-fits-all solution for their security. When even one sensor with out-of-date security updates can expose an entire network there needs to be a highly active digital security operation, working on multiple levels within the company, with suppliers and using outside experts to ensure that everything is working.
The manufacturing industry’s embrace of digitalisation and IoT technologies has brought about unparallelled opportunities for growth and efficiency. However, the surge in data generation and external threats necessitates robust on-premise data security solutions. These solutions empower manufacturers to protect their sensitive data, comply with data protection regulations, and foster trust in their operations.
By incorporating encryption, key management, secure file sharing, post-quantum cryptography, HSMs, tokenization, and code signing into their cybersecurity arsenal, manufacturing companies can secure their future while embracing the digital age.
Article by Nils Gerhardt, the chief technology officer and head of product for Utimaco
Comment on this article via X: @IoTNow_
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoData.Network Vertical Generative Ai. Empower Yourself. Access Here.
- PlatoAiStream. Web3 Intelligence. Knowledge Amplified. Access Here.
- PlatoESG. Carbon, CleanTech, Energy, Environment, Solar, Waste Management. Access Here.
- PlatoHealth. Biotech and Clinical Trials Intelligence. Access Here.
- Source: https://www.iot-now.com/2024/03/15/143219-to-make-industry-4-0-work-manufacturers-need-to-put-cyber-safety-first/
- :has
- :is
- :not
- :where
- $UP
- 4
- 5
- a
- About
- absolutely
- access
- Account
- active
- actors
- advancements
- afford
- against
- age
- algorithms
- allow
- Allowing
- allows
- also
- an
- and
- any
- approach
- architecture
- ARE
- Arsenal
- article
- AS
- At
- attack
- Attacks
- authenticity
- authorised
- away
- Bad
- Balance
- BE
- behind
- being
- belonging
- benefitting
- between
- Big
- Billion
- both
- breaches
- Break
- brought
- business
- business operations
- but
- buzzword
- by
- CAN
- CCPA
- chief
- chief technology officer
- Cloud
- cloud computing
- cloud services
- code
- collaborate
- Companies
- company
- Company’s
- competitive
- complex
- compliance
- comply
- complying
- Compromised
- computing
- concept
- confidential
- confidentiality
- Connections
- considerations
- constant
- cornerstone
- could
- course
- creates
- Credentials
- crucial
- cryptographic
- cryptography
- Currently
- damaging
- data
- Data Breaches
- data protection
- data security
- decade
- departments
- Devices
- DID
- different
- digital
- digital age
- digitalisation
- document
- dozens
- drive
- during
- each
- Edge
- Effective
- efficiency
- element
- embrace
- embracing
- Employee
- empower
- enable
- encrypted
- encryption
- end
- ensure
- ensures
- ensuring
- Entire
- equipment
- essential
- Europa
- European
- Europes
- Even
- Every
- everything
- everywhere
- exchange
- experts
- external
- Face
- factory
- far
- File
- Files
- First
- For
- Foster
- from
- future
- Garden
- GDPR
- General
- generation
- Giving
- Go
- gone
- Growth
- hackers
- Hard
- hard drive
- Have
- head
- highest
- highly
- holistic
- How
- However
- HTML
- HTTPS
- if
- implementing
- important
- improved
- in
- inactive
- include
- incorporating
- industry
- industry 4.0
- industry-specific
- industry’s
- information
- internal
- into
- iot
- IT
- ITS
- jpg
- just
- Key
- keys
- least
- Legislation
- legitimate
- less
- Level
- levels
- like
- likely
- lines
- location
- longer
- looming
- Machines
- made
- maintain
- major
- make
- Making
- managed
- management
- mandates
- Manufacturers
- manufacturing
- many
- max-width
- May..
- Meet
- meeting
- methods
- might
- Modern
- Modules
- more
- most
- much
- multiple
- must
- nearly
- necessary
- necessitates
- Need
- needed
- needs
- network
- New
- new product
- news
- no
- now
- obvious
- of
- off
- Offers
- Officer
- often
- on
- ONE
- only
- open
- opened
- opens
- operation
- operational
- Operations
- opportunities
- Organisations
- Other
- outside
- over
- own
- paradoxically
- part
- parties
- Password
- Pay
- performance
- perhaps
- personal
- personal data
- Personnel
- physical
- plans
- plato
- Plato Data Intelligence
- PlatoData
- Play
- possible
- potentially
- prevent
- preventing
- Problem
- process
- processes
- Product
- Production
- programme
- proper
- protect
- protected
- protection
- Prove
- provide
- purpose
- put
- Quantum
- quantum computing
- ransomware
- regulations
- regulatory
- reliable
- remains
- Reports
- requires
- REST
- Risk
- robotics
- robust
- Role
- safeguards
- secure
- Secured
- securely
- security
- security updates
- see
- seem
- seems
- sensitive
- sensors
- sent
- Services
- Share
- sharing
- shut
- Signatures
- significantly
- signing
- simultaneously
- single
- site
- Sites
- skilled
- So
- Software
- solution
- Solutions
- some
- Space
- standards
- storage
- stored
- strict
- strike
- stringent
- strong
- such
- suffering
- suppliers
- surge
- Systems
- Take
- targeted
- technological
- Technologies
- Technology
- terms
- than
- that
- The
- their
- Them
- themselves
- There.
- therefore
- These
- they
- things
- Third
- third parties
- this
- thousands
- threat
- threats
- time
- to
- today
- Tokenization
- Tokens
- transit
- transition
- Trust
- trustworthiness
- unaltered
- Updates
- Uphold
- use
- used
- users
- using
- Valuable
- various
- verify
- vertical
- via
- View
- Vulnerable
- Walled
- ways
- we
- whatever
- when
- which
- while
- WHO
- wider
- will
- with
- within
- without
- Work
- working
- worth
- X
- zephyrnet