
![]() |
Charlotte Stonestreet
Managing Editor |
Home> | IIot & Smart Technology | >Cyber Security | >Securing OT systems against cyber-attack |
Securing OT systems against cyber-attack
14 July 2021
WITH SMART Manufacturing continuing to merge the worlds of information technology (IT) and operational technology (OT), the demand for comprehensive security measures to protect OT networks is growing. For a standards-based approach, stakeholders can turn to the IEC 62443 guidelines. David Bean looks at the considerations
From a manufacturing perspective, cyber-attack brings the risk of lost production, theft of intellectual property and the negative impact on brand confidence as well as potential environmental damage if safety systems are affected. It is perhaps, then, not a surprise to find that, according to a Make UK report, the threat of cyber-attacks is stopping some 35% of manufacturers from investing in digitalisation.
Further, from the perspective of safety critical infrastructure, asset owners also have to consider the potential cost of being found to be non-compliant with the Network and Information Systems (NIS) Directive. In the UK, the maximum penalty for a breach of the NIS Directive is £17m, enough to give even the biggest businesses pause to think.
Implementing cyber security standards
With all of that said, though, the risk of not investing in digital transformation is enormous, particularly in this era of global competition. From an OT perspective, there are now established standards that provide all of the stakeholders in a deployed industrial automation system – the asset owners, the system designers/integrators and the individual product vendors – with the tools and guidelines that they need to secure an installation against cyber-attack.
Chief among these is IEC 62443, which provides a systematic and practical approach to cyber security for plant OT systems, covering every aspect from initial risk assessment right through to operations. It defines the differing security roles of the key stakeholders, specifying the unique requirements for each security level within the control ecosystem.
IEC 62443 reinforces the accepted ‘defence in depth’ strategy, defining methodologies for implementing OT cyber security measures and outlining procedures as well as policies that can form the methods, for firstly hindering an attack and secondly recovering from an attack.
It is notable that IEC 62443 places some considerable onus on the automation equipment supplier to embed protective features within their products to contribute to system design considerations and lifecycle management, as well as respond to any vulnerabilities that may be discovered.
Defence in depth
The ‘defence in depth’ approach that Mitsubishi adopts when advising systems integrators and asset owners on the methodologies that should be used to implement secure networks and control systems are closely aligned with IEC 62443. In addition, the company has established a Product Security Incident Response Team (PSIRT) as defined in IEC 62443, and offers a risk audit service that helps asset owners understand the risks in terms of criticality and consequence of a potential cyber breach. The service provides a written report on the status of the networked industrial control systems and offers recommendations for any remediation that is required to meet the standards set out in IEC 62443.
Most recently, Mitsubishi Electric has built a collaboration with Radiflow, whose intrusion detection and analytical tools for generating risk reports and remediation measures meet all the requirements of IEC 62443.
Evolving cyber threat
In essence, an OT cyber security solution is an insurance policy and as with so many things in life, the more comprehensive the policy, the greater the level of protection. Implementing a robust solution is part of a successful digital transformation strategy and ensures that companies can boost productivity and enhance their competitiveness.
Mitsubishi Electric strives to help businesses leverage state-of-the-art industrial automation solutions within a secure framework, while also providing a single point of contact to create smart manufacturing solutions with secure OT networks. All of this provides the foundation for a strong security platform for industrial automation systems, in accordance with IEC 62443 and meeting the requirements of the NIS Directive.
David Bean is solutions manager at Mitsubishi Electric
- Energy from waste capabilities
- Mitsubishi Electric launches two next generation controller ranges
- Are your VSDs running at maximum efficiency?
- Partnership secures substation refurbishment contract
- Pick of the show
- Cold storage blood testing automated
- Setting metalworking 4.0 in motion
- Mitsubishi launches new display range
- Converging at the Edge
- New generation of drive technology
- Protect your ICS from cyber-attacks
- Secure data handling
- Cyber security wake-up call
- Serial-to-Ethernet server
- How secure is your ERP system?
- Malware targets industrial safety systems
- Protects controllers from manipulation
- Cyber inventory solution
- Network rental scheme
- Security flaws found in power grid systems