Download document () of 20
Eaton-blog_cybersecurity_IT-OT_1500_100.jpg

New technologies such as the Internet of Things (IoT) or Big Data analyses are increasingly finding applications in the industrial environment and in manufacturing technology. But this convergence of information technology (IT) and operational technology (OT) also brings new challenges for industrial cybersecurity.

 

What is meant by IT and OT?

Although the term Information Technology is generally familiar, Operational Technology at least is a relatively new term.

IT describes the management and processing of information and originally comes from the classic business and office environment. This includes, for example, the various servers (web server, e-mail server, etc.) but also management systems such as an ERP system (Enterprise Resource Planning). Gartner defines IT as "the full range of information processing technologies, including software, hardware, communications technologies and related services."

In contrast, Gartner describes OT as "hardware and software that detects or causes a change by directly monitoring and/or controlling physical devices, processes and events." As a result, OT includes industrial control systems (ICS) such as SCADA or PLC, but also sensors, actuators and other embedded systems.

What is IT/OT convergence?

Historically, IT network and OT infrastructure were kept strictly separate. OT systems were located in their own areas and were not integrated with corporate networks and the Internet. They used special software, hardware and communication protocols. With the implementation of the Industry 4.0 concept and the pervasive digitalisation of all areas of industrial manufacturing, this shielding of OT systems from the outside world is diminishing. The boundaries between OT and IT are blurring. This development is described by the term IT/OT convergence: data and communication links from systems that process information about manufacturing (e. g. merchandise management, production planning), merge with those of Industrial Control Systems (measurement, control and regulation of production steps).

icon_Linkedin_colored_256x256.png

Follow #EatonMachine on LinkedIn

Get every important blog post or new information Eaton is pulishing for machine and systembuilders. 

What are the benefits of IT/OT convergence?

The convergence of networks is enabling or optimizing the collection and exchange of data between machines, infrastructure and applications. IT/OT convergence is improving the flow of information in the process, enabling more advanced process automation and progress in managing distributed operations. The key advantages are:

  • Decision-making in real time
  • Quality improvement in production
  • Supply chain optimisation
  • Downtime minimisation
  • Streamlined processes that lead to greater efficiency
  • New business processes
  • Real-time tracking of OT devices

 What are the risks associated with IT/OT convergence?

The fusion of IT and OT increases the attack surface for cybercriminals and other attackers. Every sensor on the manufacturing floor, every instrument, and every device accessed over an IT/OT network is at risk of a cyberattack. While IT has been addressing cybersecurity for decades, IT security in manufacturing is still fairly unexplored territory. The realisation of IT/OT security also poses a special challenge: While IT hardware is fast-moving and is usually replaced after about three years, a service life of up to 30 years and longer is quite possible in OT. Older OT devices often overlook many security aspects. This makes it a prime target for attackers who use this vulnerability as an entry point to launch an attack on the entire network.

Cybercriminals and hackers infiltrate ICS systems with malware, for example. The consequences include Denial of Service or DoS attacks that disrupt production or bring it to a complete standstill. ICS and other interconnected OT devices are also increasingly targets for attackers seeking to extort ransom or sabotage rival nations.

How do protection goals differ for IT and OT?

Another challenge for the realisation of comprehensive industrial security is the difference between the protection goals of IT and OT: While confidentiality is the top priority for IT protection goals, availability is the top priority for OT protection goals. This prevents downtime or faults in the plant on the one hand, and ensures the functional safety of the plant on the other.

How can industrial cybersecurity be realised despite the differences in IT and OT protection goals?

As diverse as the attack options are, the defensive measures are equally varied. It is true to say that industrial cybersecurity requires a comprehensive approach. In response,"Defense-in-Depth" was developed as a multi-layer basic concept against cyber attacks, which includes segmentation of the corporate network into different protection zones and demilitarized zones (DMZ). The IEC 62443 series of international standards also provides procedures, technical reports and additional information, including both processes and technical requirements for the secure implementation of ICS and their operation.

 

Blog_Cybersecurity_IT-OT-Convergenz_en.jpg

Protection goal priorities differ for IT and OT.

 

Which standards are relevant?

In addition to IEC 62443, ISO/IEC 27001 should also be considered. This provides clear guidelines for planning, implementing, monitoring, and improving information security. The ISO/IEC 27001 is the leading international standard for information security management systems (ISMS). Their implementation improves the company's processes in terms of IT security, helps ward off cyber attacks and thereby protects the company from incidents and downtimes.

Conclusion

The merging of IT and OT brings many advantages for more efficient, and more flexible production. Nevertheless, different protection goals and device requirements call for an overarching cybersecurity concept. In the whitepaper "Cybersecurity considerations for industrial control systems," Eaton describes the measures users and operators can take to protect industrial control systems and automation components from cyberattacks.

Learn more about cybersecurity

To protect industrial control systems from the increasing number of cyber attacks, a multi-layered 'defense-in-depth' defense is required. The last line of defense here is automation components and devices. Eaton describes the steps users must take to protect industrial controls and automation components from cyberattacks and how Eaton develops 'secure' products in this white paper.

Related posts