IT in Manufacturing


Cybersecurity in factory automation

November 2024 IT in Manufacturing

In the era of Industry 4.0, factory automation has transformed industrial processes, enhancing efficiency, productivity and connectivity. However, this digital evolution has also introduced new vulnerabilities, making cybersecurity a critical concern for manufacturers. Addressing these challenges is crucial to protect critical infrastructure from increasingly sophisticated cyberthreats. As part of Adroit Technologies and Mitsubishi Electric, the company is at the forefront of implementing robust cybersecurity measures in factory automation.

The growing cyberthreat landscape

Albert Einstein once said, “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” While Einstein couldn’t have foreseen the advent of cyber warfare, his sentiment about the devastating potential of future conflicts resonates today. Cyberattacks are a pervasive global issue, constantly targeting critical infrastructure, including factory automation systems.

Historically, factories operated in isolated environments, with minimal cyber risks. However, the shift towards connected factories, driven by the adoption of IoT and AI, has exponentially increased these risks. Ransomware attacks, for instance, have surged in parallel with the rise of cryptocurrencies, demonstrating the evolving nature of cyberthreats.

Legislative responses to cybersecurity challenges

Governments worldwide are responding to these threats by introducing robust cybersecurity legislation, particularly focusing on operational technology (OT) and factory automation. In the European Union, significant legislative measures include the Cyber Resilience Act and the Network and Information Systems Directive  (NIS2).

The Cyber Resilience Act

Approved by the European Parliament in March, the Cyber Resilience Act aims to create a coherent cybersecurity framework for all products with digital components, not just factory automation. This horizontal legislation impacts manufacturers, importers and distributors, requiring them to implement comprehensive cyber risk assessments and coordinated vulnerability disclosure policies. The act emphasises the importance of reporting vulnerabilities and incidents to enhance overall security.

The Network and Information Systems Directive (NIS2)

NIS2, which came into force in January 2023, extends its scope beyond critical infrastructure to include sectors such as waste management, pharmaceuticals, food and beverage, social media platforms, and cloud service providers. This directive mandates that organisations providing essential services implement cyber risk management programmes and adhere to specific reporting obligations for incidents and vulnerabilities.

Implementing cybersecurity in factory automation

Achieving compliance with these legislative frameworks, and ensuring robust cybersecurity in factory automation requires a strategic approach. Standards like IEC 62443, a group of publications focusing on cybersecurity for industrial automation and control systems, provide valuable guidance. These standards help organisations establish cybersecurity programmes, conduct risk assessments, and implement secure development lifecycles.

Practical steps for cybersecurity implementation

At Adroit Technologies, a multi-layered defence strategy known as ‘defence in depth’ has been developed in collaboration with Mitsubishi Electric to enhance cybersecurity in factory automation. This approach involves establishing clear cybersecurity policies, defining roles and responsibilities, and ensuring staff awareness and training. Implementing structured physical access controls to prevent unauthorised access to network equipment, operator terminals, and other critical components is also crucial. Additionally, creating secure zones and conduits through network segmentation, firewalls, VLANs and demilitarised zones (DMZs) helps in controlling internet access and using encrypted communication. Another essential measure is ensuring that all devices and components adhere to secure development practices, and are regularly updated to mitigate vulnerabilities is another essential measure.

Adroit Secure Mobile Gateway

The Adroit Secure Mobile Gateway (SMG) can significantly enhance your cybersecurity framework by forming part of a layered defense for your OT environment. SMG provides secure Adroit client access on any device anywhere, making it a versatile and powerful tool for maintaining cybersecurity for your Adroit installations. This additional software component offers web access to existing Adroit graphics, allowing operators to manage systems remotely through any device with an HTML 5 browser. This means that you can use Edge, Firefox, Chrome, Opera and other browsers to access the system securely, enhancing flexibility and efficiency.

One of the significant advantages of SMG is that it requires no open firewall ports. A secure channel is initiated from the client side, preventing any direct exposure to sniffing, DDOS attacks and hacking attempts. The technology runs on industry-standard encryption protocols that are RFC 4419/4432 compliant, and ensures that all communications are secure and protected against potential cyberthreats.

Furthermore, SMG employs Transport Layer Security TLS 1.3 to guarantee secure web connectivity. This widely accepted standard is used by millions of organisations globally to secure their communication channels. The gateway also provides application-specific remoting, meaning that access is granted only to the SmartUI Operator and not to any underlying operating system functions. This feature adds an extra layer of security by limiting access strictly to the application level.

The Secure Gateway Client Manager checks if a local Adroit Operator is installed, and configures an Adroit Cloud Operator with the same encrypted credentials and connection information, if found. This seamless integration ensures that your operations remain secure, without the need for additional IT infrastructure changes or open inbound ports.

The digital transformation of factory automation brings both opportunities and challenges. While enhanced connectivity and data analytics drive efficiency, they also expose systems to cyberthreats. By adhering to legislative requirements, and implementing robust cybersecurity strategies, Adroit Technologies, in partnership with Mitsubishi Electric, can safeguard operations and contribute to a secure digital economy. A sustainable society is a safe society, and in the context of the digital economy, this means a cybersecure society.

For more information contact Frits Kok, Adroit Technologies, +27 11 658 8100, [email protected], www.adroit.co.za


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved