New technologies such as the Internet of Things (IoT) or Big Data analyses are increasingly finding applications in the industrial environment and in manufacturing technology. But this convergence of information technology (IT) and operational technology (OT) also brings new challenges for industrial cybersecurity.
Although the term Information Technology is generally familiar, Operational Technology at least is a relatively new term.
IT describes the management and processing of information and originally comes from the classic business and office environment. This includes, for example, the various servers (web server, e-mail server, etc.) but also management systems such as an ERP system (Enterprise Resource Planning). Gartner defines IT as "the full range of information processing technologies, including software, hardware, communications technologies and related services."
In contrast, Gartner describes OT as "hardware and software that detects or causes a change by directly monitoring and/or controlling physical devices, processes and events." As a result, OT includes industrial control systems (ICS) such as SCADA or PLC, but also sensors, actuators and other embedded systems.
Historically, IT network and OT infrastructure were kept strictly separate. OT systems were located in their own areas and were not integrated with corporate networks and the Internet. They used special software, hardware and communication protocols. With the implementation of the Industry 4.0 concept and the pervasive digitalisation of all areas of industrial manufacturing, this shielding of OT systems from the outside world is diminishing. The boundaries between OT and IT are blurring. This development is described by the term IT/OT convergence: data and communication links from systems that process information about manufacturing (e. g. merchandise management, production planning), merge with those of Industrial Control Systems (measurement, control and regulation of production steps).
Get every important blog post or new information Eaton is pulishing for machine and systembuilders.
The convergence of networks is enabling or optimizing the collection and exchange of data between machines, infrastructure and applications. IT/OT convergence is improving the flow of information in the process, enabling more advanced process automation and progress in managing distributed operations. The key advantages are:
The fusion of IT and OT increases the attack surface for cybercriminals and other attackers. Every sensor on the manufacturing floor, every instrument, and every device accessed over an IT/OT network is at risk of a cyberattack. While IT has been addressing cybersecurity for decades, IT security in manufacturing is still fairly unexplored territory. The realisation of IT/OT security also poses a special challenge: While IT hardware is fast-moving and is usually replaced after about three years, a service life of up to 30 years and longer is quite possible in OT. Older OT devices often overlook many security aspects. This makes it a prime target for attackers who use this vulnerability as an entry point to launch an attack on the entire network.
Cybercriminals and hackers infiltrate ICS systems with malware, for example. The consequences include Denial of Service or DoS attacks that disrupt production or bring it to a complete standstill. ICS and other interconnected OT devices are also increasingly targets for attackers seeking to extort ransom or sabotage rival nations.
Another challenge for the realisation of comprehensive industrial security is the difference between the protection goals of IT and OT: While confidentiality is the top priority for IT protection goals, availability is the top priority for OT protection goals. This prevents downtime or faults in the plant on the one hand, and ensures the functional safety of the plant on the other.
As diverse as the attack options are, the defensive measures are equally varied. It is true to say that industrial cybersecurity requires a comprehensive approach. In response,"Defense-in-Depth" was developed as a multi-layer basic concept against cyber attacks, which includes segmentation of the corporate network into different protection zones and demilitarized zones (DMZ). The IEC 62443 series of international standards also provides procedures, technical reports and additional information, including both processes and technical requirements for the secure implementation of ICS and their operation.
Protection goal priorities differ for IT and OT.
In addition to IEC 62443, ISO/IEC 27001 should also be considered. This provides clear guidelines for planning, implementing, monitoring, and improving information security. The ISO/IEC 27001 is the leading international standard for information security management systems (ISMS). Their implementation improves the company's processes in terms of IT security, helps ward off cyber attacks and thereby protects the company from incidents and downtimes.
The merging of IT and OT brings many advantages for more efficient, and more flexible production. Nevertheless, different protection goals and device requirements call for an overarching cybersecurity concept. In the whitepaper "Cybersecurity considerations for industrial control systems," Eaton describes the measures users and operators can take to protect industrial control systems and automation components from cyberattacks.
Contact our team or sign up to ask questions and stay up-to-date on news, product updates and industry trends.