A production system must not fail under any circumstances!
Not even by installing security updates. However, this often means that they are put on the back burner or not installed at all. But it is precisely because of this that companies risk a successful cyberattack and thus their availability.
Until a few years ago, cyber security for production facilities was still a marginal topic. The threats seemed too abstract and theoretical, so manufacturers didn’t bother with them. This changed abruptly when several hacker attacks became known. These now also focused on automation systems and production facilities, which can ultimately result in high losses. In addition, production systems are increasingly networked (MDA) and therefore vulnerable to attack.
Prevent in good time
Increasing digital networking increases efficiency, but also the attack surface for cyber criminals. What can you as an industrial company do about this?
Make IT security a top priority!
- The final responsibility for IT security should lie with the management. Otherwise, the IT manager will lack the necessary backing in an emergency. IT security objectives and responsibilities must be clearly and unambiguously defined in a security concept. This applies to both the office and production areas. Important: This is a “living” concept that is regularly reviewed, tested and updated.
- Implement emergency management: A well thought-out IT emergency management system is essential in order to respond quickly to incidents The emergency plan defines both technical and organizational measures: for example, which incidents are to be reported to whom and who has to do what in the event of a cyber attack. You should also create restart plans and investigate the causes and evaluate the incident once operations have been restored.
- Technical protective measures in production: Technical protective measures are particularly important in a production environment. To secure the machines and systems, you should divide the entire production IT network into separate security cells and protect each of these separately. Such well thought-out network segmentation prevents the entire production from being affected in the event of a hacker attack.
- Access protection and employee sensitization: Most IT security incidents are still caused by employees. It is therefore essential that you ensure meticulous authorization and password management and secure all access and interfaces. All users should only have the rights they absolutely need.
- Control remote maintenance: External access to production IT is a critical process. All remote maintenance access should therefore be technically and organizationally secured (e.g. with regular checks by an external, proactive security tool). Access should only take place via secure connections (VPN) and protocols. Avoid access to larger network areas and only allow targeted access to selected components within fixed time windows.
The threat situation in the area of cybercrime particularly affects machine and plant manufacturers due to increasing networking. Companies should invest in their IT/OT security on an ongoing basis wherever possible — and comprehensively safeguard against residual risks.
Our proactive security tools DEFENDERBOX scans and pentests all detectable devices in your IT infrastructure, including production systems and VPN access, to identify any security gaps and vulnerabilities.
What does IT security look like at your production facilities? Use our test installation and find out!