Industrial Cyber Security
Industrial Cyber Security
www.honeywellforge.ai
INDUSTRIAL
CYBER
SECURITY
Design Guide
www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
Determining the most suitable cybersecurity elements for a given machine depends on the
likelihood and scale of consequence of an attack or breach. That’s why in this Design Guide,
we’ll review vulnerability and attack types as well as leading solutions today.
TABLE OF CONTENTS
Cybersecurity threats specific to industrial automation ......... 3
SPONSORED by:
www.honeywellforge.ai
I
ndustry 4.0 has lowered production and industrial-operation
costs while boosting flexibility, output, and quality. Core to
IIoT advancements are connectivity, data accessibility, and
interoperability with network standardization — especially on
Ethernet, enterprise, and cloud-based systems.
3 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Cybersecurity threats specific
to industrial automation Industrial organizations
can mitigate cybersecurity
threats with holistic
larger-scale damage to the targeted system or organization. security measures.
These are complete
Unsecured IoT devices and mobile devices such as
with data encryption
smartphones, tablets, and laptops are common targets. Here, wherever practical;
scams increasingly complemented by artificial intelligence (AI) network segmentation;
have come to dupe even the savviest organization personnel timely software updates
and patches; personnel
into granting attacker access to the latter.
data-safety training;
and continuous systems
A final challenge is the increased comfort with and reliance on monitoring. Image:
automatic software updates for security patches. While the Dreamstime
only practical way to maintain cybersecurity for many systems,
automatic software updates (especially spoofed and counterfeit
updates) have sometimes become the vehicles through which
bad actors have sabotaged industrial systems.
SPECIFIC CYBERSECURITY-BREACH
CONSEQUENCES
The regularity of data breaches has also made credential
stuffing — attacks that try breached IDs and passwords from
one organization on user accounts elsewhere — commonplace.
For many industrial operations, patented and proprietary A sizable percentage of any online portal’s login page are in fact
technologies are among the organization’s most valuable assets. credential-stuffing login attempts.
But because of the reliance on digital communications and other
digital systems, IIoT operations can be vulnerable to intellectual
In other cases, breached industrial systems can be remotely
property exfiltration and theft — especially when digital design
or locally loaded with computer viruses or ransomware
documentation must be intermittently made more accessible
designed to halt operations or damage equipment. Where
for legitimate uses. Stolen trade secrets and details surrounding
such malware is deployed to extract a payoff from an
product designs and processes are difficult or impossible to
organization, the payoff required to have systems decrypted
retrieve from competitors or black-market sales.
and released can be significant. In fact, large-scale industrial
operations are prime targets of ransomware deployments due
In other cases, bad actors target sensitive customer and employee to the public nature of their sizable financials.
information to extract financial value or degrade an organization’s
reputation. Regulatory penalties and legal consequences for such
data breaches incur still more financial losses. MORE FROM DESIGN WORLD ON INDUSTRIAL
CYBERSECURITY:
“If the cloud is hacked or breached, then personal content can
be used to blackmail people,” said Saswata Basu, data security Ewon and NVISO partner to bring IIoT cybersecurity to new levels
expert and the founder and CEO of Züs (formerly 0Chain) in a
A Cybersecurity System That Learns from the Hackers Themselves
comment for Design World. “False information can be inserted
into the content body without being noticeable, and no one will Digitalization and the importance of cybersecurity
suspect a data breach … and this malcontent can be used to Eight Steps to a Stronger Cybersecurity Strategy
damage reputation.”
FDA, DHS Partner to Speed Response to Medical Device
Cybersecurity Threats
Basu continued: “Data should be ideally distributed and encrypted
and then stored on the cloud. But encryption must be done on the Honeywell launches new industrial cybersecurity services to
client side, and the data must be in the user’s control rather than address customer skills gap
the cloud. That way, if the cloud is hacked, data can’t be decrypted Researchers Enable Realtime Forensic Analysis with New
by the hacker. What’s more, even if it’s not encrypted, distributed Cybersecurity Tool
data would ensure that only a small fragment is revealed to the
compromised server — and not the entire data.” Eight Cybersecurity Tools Business Needs Today
4 I www.designworldonline.com
IT/OT SECURITY CHALLENGES
AND OPPORTUNITIES
I
T/OT convergence is the integration of information technology
(IT) and operational technology (OT). Traditionally, general-
purpose IT for business administration, data processing, and
communication operated separately from the specialized
OT to monitor, control, and automate manufacturing
machinery, power generation, and transport networks. Often
OT and IT networks would’ve been physically airgapped with
no data connections (wired to wireless) between them. While
this afforded a relatively high level of OT network security, it
limited interoperability and forced operators to physically transfer
commands and data between systems.
5 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
IT/OT security challenges and opportunities
In addition, many mature security tools and approach frameworks Because it’s often impossible to implement authentication and
developed for IT apply to OT environments. Case in point: re-authentication protocols needed for a zero-trust architecture
The U.S. National Institute of Standards and Technology (NIST) at the ICS level, mediation of external communication is
Cybersecurity Framework is a set of guidelines first established in often executed by an industrial demilitarized zone or IDMZ.
2014 to mitigate cybersecurity risks. Due to the rapidly evolving Fundamentally, the OT’s ICS level cannot provide necessary
nature of cyberthreats, this Framework is continually refined with security checks, so this must be separated from the rest of the
updates … including those applicable to OT. As we’ll explore network. Then only some OT elements are integrated into the
in more detail later in this Design Guide, such methods include enterprise environment on the IT side.
segmentation, zero-trust, authentication, and encryption.
For example, factory-floor devices to monitor inventory and
“
track material flows likely use internet protocols and do not need
While converged environments are subject to direct communication with ICS hardware. Such devices are better
heightened security challenges, the operational located on the IT network. That said, the ICS must be able to
benefits and opportunities for improved security continue operating if the IDMZ stops all communication (as when
“
mean upgrading to a connected enterprise often
a major attack is detected). Therefore, ICS networks must contain
ranges from worthwhile to necessary to
all systems needed for independent operation.
stay competitive.
6 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
IT/OT security challenges and opportunities
7 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
IT/OT security challenges and opportunities
Services featuring sandbox tools give programmers safe [read: AI can also determine whether a machine is merely malfunctioning
isolated] spaces to write, install, run, and observe code (whether on its own (due to a need for servicing, for example); incorrectly
new or otherwise untrusted) before deployment on a working operated by inexperienced plant staff; or truly being attacked
network. Such tools prevent host-machine malware infection. with nuanced systems for detecting saboteurs — especially those
Blocking access to suspicious URLs and domain name system actively damaging or detrimentally changing machine settings.
(DNS) names is another service to prevent ingress of operations
via an attacking command and control server. These command MORE ON INDUSTRIAL CYBERSECURITY:
(via an under-monitored backdoor or DNS tunneling) equipment
on the compromised network to transmit data and perform other
detrimental actions. Some services work to protect the initial What an end-to-end digital manufacturing approach might look like
intrusion and any pivot spread of malware to other equipment Retrofitting CNC systems to safeguard against cyberattacks
should a breach occur to prevent the establishment of botnets and
Make the pitch for automation security with this updated tech note
other potentially catastrophic and overwhelming developments.
Securing the IIoT
Keeping the bad guys out of industrial networks
THE ROLE OF AI IN INDUSTRIAL CYBERSECURITY
Army researcher minimizes the impact of cyber-attacks in cloud
computing
The use of artificial intelligence’s computing power has seen Why 50,000 ships are so vulnerable to cyberattacks
exponential rise over the last two years. In fact, AI is employed
by industrial cyberattackers and cybersecurity teams alike.
“Cybersecurity positives stretch across industries,” said Quad9
chief security officer Danielle Deibler in a recent interview about
AI with Design World. “Machine learning and AI can analyze
network traffic to identify anomalies and suspicious activity …
and potentially help predict future threats based on patterns it
recognizes in the data.” AI can perform this function a lot faster
than a human, she added.
8 I www.designworldonline.com
WAYS TO EMPLOY
ACCESS CONTROL
FOR INDUSTRIAL
CYBERSECURITY
Image: Dreamstime
A
ccess control is about controlling who and what can
see and use internal systems and data. Establishing
good access-control rules starts with identifying who or
what needs access and the conditions under which they
need it. Then the industrial-network designer can define how the
organization will identify users, devices, and systems.
9 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Ways to employ access control for industrial cybersecurity
The first step in developing appropriate identity and access Multifactor authentication demands at least two forms of
management policies and processes is to consider the users verification to authenticate a user’s identity. These may include
and devices that need access to data, devices, and systems, as passwords, codes sent to SMS or email accounts, biometrics,
well as when they will need this access, why they need it, and codes generated by authentication apps on user devices, or
under what conditions. Then the industrial network designer can physical tokens such as USB sticks or keys. It’s also known as two-
define how the organization will identify users and devices. It’s factor authentication. Authentication factors can be conveniently
important to cover as many possible types of users as possible at categorized into four groups:
Image:
Dreamstime
10 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Ways to employ access control for industrial cybersecurity
11 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Ways to employ access control for industrial cybersecurity
As in consumer settings, industrial systems should require unique MORE ON INDUSTRIAL CYBERSECURITY
passwords for each account on a network and each privilege.
At the same time, each password should be especially strong
— which ideally means a random string of letters, numbers, and Unnerving: Public safety systems aren’t exempt from
special characters. Remembering all these different passwords cybersecurity vulnerabilities
becomes virtually impossible and inevitably leads to users writing Army scientists revolutionize cybersecurity through
them down without password managers. A password manager quantum research
stores the passwords in a securely encrypted form, removing the
Gigabit Ethernet switches simplify configuration and boost security
need to remember them and the risk of them being stolen from
where they’re written. New approach to machine lifecycle support benefits people,
parts, and processes
12 I www.designworldonline.com
TYPES OF END-TO-END INDUSTRIAL
CYBERSECURITY PROTECTION
A
pproaches to industrial cybersecurity include network Segmentation may be implemented using firewalls and virtual
segmentation, perimeter security, access control and local area networks (VLANs). A segmentation policy may control
authentication, endpoint protection, data encryption, traffic by type, source, or destination. Microsegmentation gives
intrusion detection and prevention, security monitoring even more control over access to different network areas with
and analytics, security training and awareness, supply chain things such as application-layer information to control access.
security, and incident response.
Besides protecting sensitive areas from cyberattacks,
“
“
Methods can be combined to provide
an end-to-end defense.
segmentation may also protect performance-critical operations
from being slowed by heavy network traffic.
13 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Types of end-to-end industrial
cybersecurity protection
services from any location, regardless of whether they’re physically
attached to the company network. At the same time, they expect
to have access to data and services anywhere in the world, using
the internet unrestrictedly while they’re attached to the company
network. Remote desktop software further weakens the network
perimeter because users anywhere in the world can access
devices that are physically connected to the network.
AUTHENTICATION AND
MACHINE ACCESS CONTROL
All authentication involves credentials checks — whether via a Codes have been used throughout history to transmit secret
simple user ID and password requirement (increasingly considered messages and render them useless if intercepted. This is the basic
inadequate) or login information plus an additional element for concept of industrial data encryption, which encodes files and data
multifactor authentication via some blend of password, biometric, into formats that are completely unintelligible without decoding.
security token, and mobile push-notification checks.
Within cryptography, codes called ciphers are employed to convert
Authorization may be statically determined using an access- readable messages into ciphertext via a process called encryption.
control list — simply checking a list to see whether a user has Converting the data back into a readable format is known as
been granted access to the resource requested, for example. decryption. Early codes substituted letters, words, or phrases for
More sophisticated dynamic authorization processes may also code words, and senders and recipients would use a codebook
consider the broader context of the requests, such as whether the to obscure and decode messages. Such systems can be defeated
user’s system has security updates, their physical and temporal relatively easily by tracking patterns such as word frequency. Brute-
location when making the request, and any suspicious behavior force methods, involving the use of all possible substitutions until
they may have exhibited. Such an approach may use sophisticated an intelligible message is reconstructed, can also be effective.
data analytics or artificial intelligence (AI) to check for anomalies.
In contrast, most modern cryptography uses mathematical
Endpoint security: Endpoint security fortifies user-access points algorithms to encode data in extremely complex patterns. Although
against exploitation. Endpoints are devices such as computers theoretically breakable, data encrypted in this way could only be
and phones that serve as entry points into sensitive data and cracked by prohibitively expensive brute-force methods employing
service systems. Malicious actors typically seek to remotely or massive computational effort, essentially rendering them secure.
automatically use devices’ access via malware, such as viruses and However, the information needed to unlock the algorithm can be
worms. In fact, endpoint security is most important for shielding represented by a relatively concise passcode known as a key.
14 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Types of end-to-end industrial
cybersecurity protection
In industrial networking, this basic perimeter concept is adapted to control external connections. Image: Dreamstime
It’s now possible to encrypt messages that are uncrackable even • IDS stateful protocol analysis also detects anomalies
via unlimited computational time and effort. However, such by comparing behavior with predetermined profiles for
encryption is impractical and rarely used to protect data. This benign activity.
uncrackable one-time pad method was first described in the
19th century; it requires a single-use key at least as large as the Security monitoring and analytics shift the focus from a perimeter-
message being encrypted. In fact, more recent mathematical security mentality to a zero-trust approach so that all activity is
proofs have confirmed that unbreakable ciphers must use a key at monitored, not just access originating external to a network.
least as large as the data that it encrypts.
Security training and awareness: All security systems must be
current and correctly working together. Ensuring they’re up to
INTRUSION DETECTION AND PREVENTION date requires thoroughly proficient network personnel having
knowledge that is also current. Therefore, it’s key to regularly train
staff responsible for cybersecurity and ensure everyone involved
Authentication and access control systems sometimes fail to in running the network fully understands cybersecurity measures
prevent unauthorized users from accessing network resources. in place at the organization.
The next line of defense consists of intrusion detection systems or
Supply chain security: Extensive supply chains involving many
IDSs that monitor network traffic for signs of possible intrusions.
suppliers have myriad vulnerabilities. Securing such commerce
The latter can include exploit attempts or anything that may
and distribution should begin with an understanding of the data
damage the network. Intrusion prevention systems or IPSs go
sensitivity held by each supplier and what security arrangements
one step further by stopping intruders once they’re detected
each has in place. Control begins with communication and
dropping data packets and terminating sessions. These functions
setting clear, appropriate, and achievable minimum-security
are typically carried out by a next-generation firewall.
requirements. Once set, such standards must be verified and
Attackers often try to exploit known vulnerabilities within devices continuously revised for improvement.
and software. IDS and IPS systems can detect these exploit
Incident response: A cyber incident response or CIR is a set of
attempts to block the attacker before gaining access to an
actions taken after a security incident is detected. These should
endpoint or gathering compromising information about network
quantify the impact of the incident on the organization’s systems,
vulnerabilities.
manage immediate impacts, remove specific vulnerabilities that
• Signature-based IDS detection compares observed allowed the incident to occur, and summarize lessons learned to
behavior against known threat patterns. boost security more generally across the network. A cyber incident
report should be produced to detail all these items for internal use
• Anomaly-based IDS detection looks for anything unusual, and distribution to impacted trade partners. For serious incidents,
including new and unknown threats. national cybersecurity agencies may need to be notified.
15 I www.designworldonline.com
Image: Dreamstime
T
he CIP Security network extension from the Open protect bulk electric systems from physical and cyber threats,
DeviceNet Vendors Association (ODVA) network- these are maintained by the international regulatory authority
standards body protects converged environments, system known as the North American Electric Reliability Corp. or NERC.
data, and individual devices from man in the middle Compliance with NERC CIP standards helps utilities maintain
(MitM) attacks and much more. In fact, as the Common Industrial power continuity for the good of public safety. The standards
Protocol links EtherNet/IP, DeviceNet, and other communications require comprehensive programming that includes identification
in industrial automation, CIP Security is suitably positioned on and protection measures for key infrastructure assets and defined
networks to manage and execute device authentication, integrity, responses to security incidents.
and keys; trust domains and user authentications; and data
confidentiality for modest yet IoT-connected field devices. Policy
SOME SPECIFICS OF ODVA CIP SECURITY
enforcement via a proxy or gateway is also possible.
16 I www.designworldonline.com
EMPLOYING
ZERO-TRUST ARCHITECTURE
N
ever trust — always verify. The zero-trust security model is Zero trust architecture is increasingly being deployed across
based on this general principle and treats all connections organizations in diverse sectors, including business, government,
as hostile until verified. It’s also known as zero-trust defense, cloud services, banking, and healthcare. Traditionally,
architecture or ZTA and sometimes perimeterless airgapped networks were perceived as the most secure, with no
security. That’s because users and devices aren’t trusted simply wired or wireless connection to the outside world. However, even
because they’re already inside — in other words, previously verified systems with the most hardened perimeters have vulnerabilities.
or already connected to a permissioned network. This contrasts Malicious infiltrators can attach portable devices to or directly
with traditional security models, which protect a perimeter around enter code into airgapped networks. There have also been
sensitive data with devices such as firewalls. demonstrations of radio and acoustic-wave attacks bridging
airgaps. Lack of an internet connection means software updates
Trust is never implicitly granted and must instead be occur much less regularly, so the system will be more vulnerable
continuously evaluated. to attack when the perimeter is breached. Furthermore, as
humankind increasingly depends on the internet, airgapped
A zero-trust approach means the same level of security is
networks are increasingly impractical. Both factors explain the rise
available regardless of where a user accesses a network from. This
of zero-trust architecture.
is more secure than relying on perimeter defense, and it’s also a
very scalable approach. It also gives greater convenience to users
because they have the same access rights when off-site as when ZTA BACKGROUND AND STANDARDS
physically connected to a network.
17 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Employing zero-trust architecture
18 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Employing zero-trust architecture
6. All resource authentication and authorization are 5. Implement continuous monitoring and analytics to track user
dynamic and strictly enforced before access is allowed. behavior and network traffic. This will enable any anomalies
Authentication and authorization are happening on to be identified, leading to realtime threat intelligence.
a continuous cycle of identity, credential, and access
management (ICAM) throughout user transactions — 6. Ensure that data is encrypted both during transfer and
including the use of multifactor authentication (MFA) for storage.
at least the most important resources. The criteria for
7. Define an incident response plan for the event of a
reauthentication and reauthorization may be based on
security breach.
time, new resource requests, resource modification, or
suspicious behavior. 8. Carry out regular audits to continuously improve the
security system.
7. The enterprise collects as much information as possible
about the current state of assets, network infrastructure, and “Zero trust isn’t something one can buy or implement; it’s a
communications and uses this information to improve its philosophy and a strategy,” said IBM chief information security
security posture. officer Koos Lodewijkz. “To be frank, at IBM, we wouldn’t even
characterize zero-trust as a security strategy. It’s an IT strategy
“
done securely.”
As data and services move into the cloud, zero-trust
approach to cybersecurity.
“
architecture is increasingly becoming a preferred
ZTA is an approach to security that revolves around the cloud.
Cloud-based computing isn’t just about users having consistent
access to data and applications from any device and location.
It’s also about protecting data because the internal network
The UK National Cybersecurity Centre defines ten principles for can be considered hostile. It’s also important that continuous
ZTA that are more vague than the NIST tenants. These principles re-authentication and re-authorization don’t become a massive
come with some general directives: know the architecture — inconvenience for users; ideally, it would work seamlessly in the
including users, devices, and services; create a single strong background. Microsoft aims to create this seamless zero-trust
user identity and create a strong device identity; authenticate environment using gate access based on realtime analytics
everywhere and know the health of devices and services. combined with monitoring and control of user actions.
There are other general directives: Focus monitoring on devices Following the principles set out in this article will give a good
and services. Set policies according to the value of the service or guide to defining a strategy for its implementation. When it
data. Control access to services and data. Don’t trust the network, comes to the nuts and bolts of setting up the IT systems for ZTA,
including the local network. Choose services designed for zero trust. expert guidance will be needed for specific systems.
19 I www.designworldonline.com
BASICS OF AN IDMZ
Image: Dreamstime
A
n IDMZ is a cybersecurity network segment that serves • Firewalls at the perimeter of the DMZ control traffic, enforce
as a middle-ground buffer between an exposed security policies and restrict access to authorized services.
network segment and a protected sensitive segment.
The acronym IDMZ can refer to an internet demilitarized • Intrusion Detection and Prevention Systems (IDPS)
zone or (in newer technical references including this one) an monitor network traffic to and from the IDMZ to detect
industrial demilitarized zone. An internet demilitarized zone is an potential security threats.
older concept; here, it’s just called a DMZ.
• Load balancers distribute network traffic across multiple
More specifically, a DMZ protects a company network from servers hosting the services in the DMZ. This improves
vulnerable publicly accessible web services, while an IDMZ protects performance, availability, and scalability of the publicly
an industrial control system or ICS from the rest of the network. accessible services.
Firewalls isolate DMZs and IDMZs. • Reverse proxies handle requests from the external
network to the internal services in the DMZ, providing an
The ICS is often critical to safety and high-value business operations additional layer of security by validating requests before
— controlling things such as manufacturing machinery, medical forwarding them to relevant internal servers.
equipment, power generation, and transportation networks.
Although such systems need maximum security, they still need to • Application gateways inspect and filter traffic at the
communicate with quality, enterprise, supply chain, and energy application layer, protecting against attacks aimed at
management systems. All this connectivity employs various vulnerabilities in specific applications.
protocols for database and web connections as well as file transfers.
• Intrusion prevention systems (IPSs) monitor and analyze
network traffic to identify patterns that indicate a potential
HOW A DMZ NETWORK SEGMENT WORKS threat and then take action to block or mitigate them.
20 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Basics of an IDMZ
HOW AN IDMZ NETWORK SEGMENT WORKS Reliance solely on perimeter defense doesn’t satisfy modern
standards for zero-trust cybersecurity. The latter requires all
communications to be validated — even when coming from
within the network segment. Zero-trust also requires every
An IDMZ can work essentially like a conventional DMZ. The
individual request to be evaluated using a dynamic policy that
key difference is that in traditionally arranged legacy networks,
evaluates the threat level at hand based on various factors —
internet services were mostly separate from the core business
not simply user credentials. However, the NIST standard for Zero
activities of most system users. Risky activities could therefore
Trust Architecture (SP 800-207) does concede that implicit trust
stay separate from the main network. With an IDMZ, this
zones may be necessary. It states that these zones should be as
situation is now reversed so that users on the enterprise network
small as possible, requiring users to revalidate before moving
are continuously accessing the internet, such that the internet
closer to important resources. Within the implicit trust zone,
becomes the risky area, and the industrial network becomes the
users must have established trust to at least the level of the last
area needing protection.
gateway. The use of an IDMZ to protect critical equipment is
entirely aligned with such an approach.
21 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Basics of an IDMZ
Image: Dreamstime
Firmware and software may no longer be supported, and even The key is correctly choosing what will be located on the
when updates are available, managers often elect to leave enterprise network and what will be located on the protected
machines un-updated for fear of disturbing the complex data industrial network. Some choices are obvious, but others need
ecosystem enabling critical operations to continue. more thought. Clearly, computers used to run office applications,
send emails, and access customer databases sit on the enterprise
What’s more, legacy ICS devices usually have no built-in security. network. Similarly, machine controllers running legacy firmware
Rather, they completely trust any communication they receive, simply sans built-in authentication will sit on the industrial network.
responding without any authentication or authorization process. They
also have no way of detecting attack signatures or anomalies. But what about a barcode scanner used for tracking inventory on
the shop floor?
These challenges highlight the need for an IDMZ. ICS devices
are often more critical than the ordinary IT network and far more At first, it may seem that barcode scanners should be part of the
vulnerable. For legacy systems, it’s impossible to implement a industrial network. However, scanners use internet protocols to
zero-trust architecture at the level of the ICS devices, so a strong send information to a manufacturing execution system (MES) or
perimeter defense is all the more vital. ERP system. Therefore, these should sit on the enterprise network
where this type of communication largely takes place.
CREATING A STRONG IDMZ How about an IIoT sensor used to monitor a machine tool?
IIoT sensors also use internet protocols, but because they must
The IDMZ is a middle ground between the insecure enterprise more directly interact with the machine controller, they’re most
network and the secure ICS network. If ICS devices can’t execute suitably connected to the industrial network. Here, the IMDZ is
additional checks for suspicious behavior or highly sensitive key to ensuring that internet connections established by the IIoT
requests, these security functions must be handled at the IDMZ sensor won’t expose the entire ICS network to threats.
level. This means authentication and authorization to the ICS
In fact, for continued operation of the IDMZ in the event of a
shouldn’t simply grant perpetual and universal access. Users
connectivity disruption, all resources needed to operate the ICS
should be re-authenticated and authorized when they make
should be located on the ICS network.
different requests, and all traffic should be monitored for threat
signatures and anomalies.
22 I www.designworldonline.com
INDUSTRIAL CYBER SECURITY I DESIGN GUIDE
(continued)
Basics of an IDMZ
An IDMZ typically involves a small network Shown here are the Purdue Enterprise Reference Architecture (PERA) model levels.
with servers that process the inter-network
communication, connected to both networks via
firewalls. Next-generation firewalls (NGFWs) help
to secure an IDMZ. While conventional industrial
firewalls provide protocol and port inspection,
NGFWs also conduct data analyses at the
application level. This lets them filter out malware
from network-based communication. When a
user attached to the enterprise network wants
to establish a connection with a resource on the
industrial network, the connection is made through
a broker server within the IDMZ. Authentication and
authorization are handled by this broker server.
Image: Dreamstime
23 I www.designworldonline.com
REDUCE
OT CYBERSECURITY
RISK
LEARN MORE