IT in Manufacturing


Why separation of control and business networks is critically important

November 2013 IT in Manufacturing

Traditionally, control system networks were based on proprietary protocols and infrastructure. While cost and complexity were detrimental factors, the advantage of these systems was an inherent level of security not provided by contemporary control communication architectures.

Interoperability and information exchange between business and control systems has become increasingly important as ERP and MES systems marry the business and control environments. Unfortunately the easiest way to facilitate this information exchange is to ensure that there are no intervening devices that can derail communication. The result: a convenient, but high risk sharing of infrastructure. Control systems are now unintentionally exposed to the Internet, and a greater amount of unauthorised access, simply because the sharing of infrastructure makes physical access control much more difficult.

The question may be asked, “But what makes control networks different?” The answer to this can be surprisingly complex, but in essence the requirements or ‘objectives’ are very different. Figure 1 shows that while there is a certain amount of convergence, priorities are fundamentally different.

Figure 1.
Figure 1.

What must be done to separate and secure your control networks?

Have a limited number of access points between the business and control networks: preferably there should only be one connection in a physically secured area. This is not always possible, but the number must be as small as possible.

Implement firewalled DMZs or unidirectional data gateways as part of the access point(s): losing the connection or protecting firewalls to an attack should allow one to physically disconnect and isolate the control network to allow continued integrity and operation of the control system.

Unplug the Internet: the biggest threat faced by owners of control systems is direct access to equipment from the Internet. This is ably illustrated by Shodan (www.shodanhq.com). The most frequent objection to this is that remote access is required. Probably the safest solution, although it is not perfect, is to make use of VPN access with the VPN forming part of the firewall.

Check for intrusion: very few control networks are equipped with intrusion detection systems. The fact is control systems will experience unexplained problems and outages and in some (hopefully relatively few) cases it will be due to system intrusion. The problem is however, if you do not monitor for it, you will most likely never know your systems have been penetrated.

Get rid of dual zoned equipment: people using one machine for business and process will almost never consider the impact of having one machine with direct access to both networks. Even if only one machine like this exists on the network, it invalidates all firewall separation because it provides a direct alternative route to the control network. Many of the inadvertent Internet exposures take place in this manner.

In conclusion, it is critical to separate control and business networks as the security problems can have dire consequences. The one aspect that is frequently ignored is that it must be a managed, controlled and monitored process, just like quality or safety management.

For more information contact Cobus Pool, Proconics, +27 (0)17 620 9725, [email protected], www.proconics.co.za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Platform for integrated digital mine management
IT in Manufacturing
Becker Mining launches platform for integrated digital mine management

Read more...
The reimagined building of today and tomorrow
Schneider Electric South Africa IT in Manufacturing
Retrofitting a building is a truly practical way of achieving energy efficiency, compliance and long-term competitiveness.

Read more...
The Konecranes portal, a benchmark in data supply
IT in Manufacturing
The newly launched Konecranes Portal takes online communications to the next level through its single point of access to its digital customer platforms.

Read more...
End-to-end security across IT and OT environments
IT in Manufacturing
Siemens is collaborating with Accenture to offer 24/7 managed IT/OT security operations centre services, providing end-to-end security across IT and OT environments.

Read more...
Mitigating cybersecurity threats
IT in Manufacturing
Wesco is a world leader in electrical, communications and utility distribution and supply chain services and a member of the Rockwell Automation PartnerNetwork programme. To build their cybersecurity portfolio, Wesco turned to two Rockwell Automation offerings, a security posture survey and threat detection services.

Read more...
MRO inventory optimisation
RS South Africa IT in Manufacturing
Maintenance, repair and operations inventory optimisation is not just a technical concern, it is a strategic priority for industries that depend on operational reliability and efficiency.

Read more...
Liquid cooling solutions for hyperscale data centre environments
Schneider Electric South Africa IT in Manufacturing
Schneider Electric has unveiled its world-leading portfolio of end-to-end liquid cooling solutions for hyperscale, colocation and high-density data centre environments, engineered to enable the AI factories of the future.

Read more...
Corrosion in data centre cooling systems
IT in Manufacturing
Taking proactive steps to fight corrosion is critical to maintaining healthy cooling towers alongside data centres.

Read more...
Smart assistant supports troubleshooting and analyser maintenance
IT in Manufacturing
The Siemens Industrial Copilot for process analyser technology is a smart, offline assistant that supports technicians in troubleshooting and maintaining analysers.

Read more...
AI and the smart factory
Schneider Electric South Africa IT in Manufacturing
Imagine walking into a factory where machines can think ahead, predict problems before they happen, and automatically make adjustments to realise peak performance. This isn’t science fiction; it’s happening right now as AI transforms how we run industrial operations.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved