IT in Manufacturing


Cybersecurity in factory automation

November 2024 IT in Manufacturing

In the era of Industry 4.0, factory automation has transformed industrial processes, enhancing efficiency, productivity and connectivity. However, this digital evolution has also introduced new vulnerabilities, making cybersecurity a critical concern for manufacturers. Addressing these challenges is crucial to protect critical infrastructure from increasingly sophisticated cyberthreats. As part of Adroit Technologies and Mitsubishi Electric, the company is at the forefront of implementing robust cybersecurity measures in factory automation.

The growing cyberthreat landscape

Albert Einstein once said, “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” While Einstein couldn’t have foreseen the advent of cyber warfare, his sentiment about the devastating potential of future conflicts resonates today. Cyberattacks are a pervasive global issue, constantly targeting critical infrastructure, including factory automation systems.

Historically, factories operated in isolated environments, with minimal cyber risks. However, the shift towards connected factories, driven by the adoption of IoT and AI, has exponentially increased these risks. Ransomware attacks, for instance, have surged in parallel with the rise of cryptocurrencies, demonstrating the evolving nature of cyberthreats.

Legislative responses to cybersecurity challenges

Governments worldwide are responding to these threats by introducing robust cybersecurity legislation, particularly focusing on operational technology (OT) and factory automation. In the European Union, significant legislative measures include the Cyber Resilience Act and the Network and Information Systems Directive  (NIS2).

The Cyber Resilience Act

Approved by the European Parliament in March, the Cyber Resilience Act aims to create a coherent cybersecurity framework for all products with digital components, not just factory automation. This horizontal legislation impacts manufacturers, importers and distributors, requiring them to implement comprehensive cyber risk assessments and coordinated vulnerability disclosure policies. The act emphasises the importance of reporting vulnerabilities and incidents to enhance overall security.

The Network and Information Systems Directive (NIS2)

NIS2, which came into force in January 2023, extends its scope beyond critical infrastructure to include sectors such as waste management, pharmaceuticals, food and beverage, social media platforms, and cloud service providers. This directive mandates that organisations providing essential services implement cyber risk management programmes and adhere to specific reporting obligations for incidents and vulnerabilities.

Implementing cybersecurity in factory automation

Achieving compliance with these legislative frameworks, and ensuring robust cybersecurity in factory automation requires a strategic approach. Standards like IEC 62443, a group of publications focusing on cybersecurity for industrial automation and control systems, provide valuable guidance. These standards help organisations establish cybersecurity programmes, conduct risk assessments, and implement secure development lifecycles.

Practical steps for cybersecurity implementation

At Adroit Technologies, a multi-layered defence strategy known as ‘defence in depth’ has been developed in collaboration with Mitsubishi Electric to enhance cybersecurity in factory automation. This approach involves establishing clear cybersecurity policies, defining roles and responsibilities, and ensuring staff awareness and training. Implementing structured physical access controls to prevent unauthorised access to network equipment, operator terminals, and other critical components is also crucial. Additionally, creating secure zones and conduits through network segmentation, firewalls, VLANs and demilitarised zones (DMZs) helps in controlling internet access and using encrypted communication. Another essential measure is ensuring that all devices and components adhere to secure development practices, and are regularly updated to mitigate vulnerabilities is another essential measure.

Adroit Secure Mobile Gateway

The Adroit Secure Mobile Gateway (SMG) can significantly enhance your cybersecurity framework by forming part of a layered defense for your OT environment. SMG provides secure Adroit client access on any device anywhere, making it a versatile and powerful tool for maintaining cybersecurity for your Adroit installations. This additional software component offers web access to existing Adroit graphics, allowing operators to manage systems remotely through any device with an HTML 5 browser. This means that you can use Edge, Firefox, Chrome, Opera and other browsers to access the system securely, enhancing flexibility and efficiency.

One of the significant advantages of SMG is that it requires no open firewall ports. A secure channel is initiated from the client side, preventing any direct exposure to sniffing, DDOS attacks and hacking attempts. The technology runs on industry-standard encryption protocols that are RFC 4419/4432 compliant, and ensures that all communications are secure and protected against potential cyberthreats.

Furthermore, SMG employs Transport Layer Security TLS 1.3 to guarantee secure web connectivity. This widely accepted standard is used by millions of organisations globally to secure their communication channels. The gateway also provides application-specific remoting, meaning that access is granted only to the SmartUI Operator and not to any underlying operating system functions. This feature adds an extra layer of security by limiting access strictly to the application level.

The Secure Gateway Client Manager checks if a local Adroit Operator is installed, and configures an Adroit Cloud Operator with the same encrypted credentials and connection information, if found. This seamless integration ensures that your operations remain secure, without the need for additional IT infrastructure changes or open inbound ports.

The digital transformation of factory automation brings both opportunities and challenges. While enhanced connectivity and data analytics drive efficiency, they also expose systems to cyberthreats. By adhering to legislative requirements, and implementing robust cybersecurity strategies, Adroit Technologies, in partnership with Mitsubishi Electric, can safeguard operations and contribute to a secure digital economy. A sustainable society is a safe society, and in the context of the digital economy, this means a cybersecure society.

For more information contact Frits Kok, Adroit Technologies, +27 11 658 8100, [email protected], www.adroit.co.za


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Unlocking mining efficiency with advanced processing control
IT in Manufacturing
ABB’s Advanced Process Control system, powered by its Expert Optimizer platform, is emerging as a key enabler of smarter, more efficient mining operations.

Read more...
Open control technology reduces energy consumption and carbon footprint.
Beckhoff Automation IT in Manufacturing
The Swedish company Airwatergreen AB is breaking new ground in the dehumidification of air in industrial buildings and warehouses. PC-based control from Beckhoff regulates the innovative process.

Read more...
Harnessing AI and satellite imagery to estimate water levels in dams
IT in Manufacturing
Farmers and water managers often struggle to accurately estimate and monitor the available water in dams. To address the challenge, International Water Management Institute researchers have worked with Digital Earth Africa to create an innovation that uses satellite images and AI to get timely and accurate dam volume measurements.

Read more...
Why industry should enter the world of operator training simulators
Schneider Electric South Africa IT in Manufacturing
System-agnostic operator training simulator (OTS) software is a somewhat unsung hero of industry that trains plant operators in a virtual world that mirrors real-world operations. The benefits are multiple.

Read more...
Track busway for scalable data centre power delivery
IT in Manufacturing
The latest generation Legrand Data Centre Track Busway technology addresses the operational pressures facing today’s high-density, AI-intensive computing environments and is being well received by data centre facilities around the world.

Read more...
Poor heat management in data centre design
IT in Manufacturing
Designing a world-class data centre goes beyond simply keeping servers on during load shedding; it is about ensuring they run efficiently, reliably, and within the precise environmental conditions they were built and designed for.

Read more...
It’s time to fight AI with AI in the battle for cyber resilience
IT in Manufacturing
Cybercrime is evolving rapidly, and the nature of cyber threats has shifted dramatically. Attacks are now increasingly powered by AI, accelerating their speed, scale and sophistication. Cybersecurity needs to become part of business-critical strategy, powered by AI to match attackers’ speed with smarter, faster and more adaptive defences.

Read more...
Why AI sustainability must be a boardroom priority
IT in Manufacturing
As South African companies race to harness artificial intelligence for innovation and growth, few are asking the most critical question - the environmental cost.

Read more...
RS South Africa shines spotlight on MRO procurement
RS South Africa IT in Manufacturing
RS South Africa has highlighted the growing pressures faced by procurement professionals responsible for maintenance, repair and operations supplies across the country’s vital economic sectors.

Read more...
Sustainable energy management
Siemens South Africa IT in Manufacturing
Utilising its innovative ONE approach technology, Siemens provides complete transparency on resource consumption and offers data-driven optimisation recommendations for sustainable energy management.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved