- All Articles
Industry 4.0 and IIoT Security Design and Architecture
Keep your smart manufacturing factory secure.
By the year 2020, Gartner states there will be 26 billion Internet of Things (IoT) devices on the internet . these devices provide incalculable advantages to smart factory automation, plant management, smart manufacturing processes and many other aspects of Industry 4.0, there also comes the risk of any interconnected IIoT device with access to the Internet.
These IoT devices are known to have insecure interfaces, weak authentication, lack of encryption, difficulty for security configuration, weak physical security, and in worst cases, vulnerable out of the box.
In a recent memo concerning the threat of attacks targeting IoT devices, the United States Federal Bureau of Investigation (FBI) issued an alert notifying the public of threats which may harm unprotected IoT devices, and the risks they can expose the owners of the devices to. The report details what type of devices can be targets for attack, attack vectors, as well as the indicators of compromise .
industry 4.0 iiot security:
the threat to industry 4.0 systems, as well as any cyber-attack in this era of cyber security, may arrive in various forms and may come from varying sources. these threat actors can range from the simple threat of an internal disgruntled employee with limited, but destructive knowledge of industry 4.0 systems, to nation-states attempting to paralyze cyber-physical systems at the national level.
an example of one of these threats arrived in the form of the well-documented ‘mirai’ malware. mirai scans the internet for unprotected iot devices using default credentials and has the capability to take down unsecured devices. the ‘mirai’ malware was not originally designed to be used for this use. the malware was designed by its creators to simply make money from an online game . however, as the code was posted for anyone to use, it was quickly picked up by hostile actors. ‘mirai’ was used in ddos service attacks against popular websites such as airbnb, github, netflix, reddit, twitter and many other websites .
had iot devices been placed on networks with the security of these devices in mind and the devices themselves secured, the impact of mirai attacks could have been limited.
with this example in mind, designing or redesigning the security of the networks which house these systems must consider the full spectrum of threats. these include attacks like mirai which sweep the internet for default credentials, to targeted attacks which may include zero-day vulnerabilities.
an analysis by symantec concluded the average iot device is scanned every two minutes. this means that a vulnerable device, such as one with a default password, could be compromised within minutes of going online . this means that simply changing a default password may not be enough to protect a network in the event a vendor or system administrator forgets to change the default credentials. security must be strong across the network which hosts industry 4.0 systems.
protecting your smart manufacturing network
although securing these devices individually greatly protects against compromise, protecting individual devices alone is not a sustainable or practical approach to the problem. this would be a time-consuming remedy and would be futile if the attacker has scanners which can detect the iot device within a matter of seconds, threatened by an insider with physical access to the device, or the device is already compromised from the factory.
network security design for industrial iot devices must consider the changes that will occur at all levels of security. this may include changes to firewall ports to allow iiot devices to communicate over designated ports rather than default ports, which will limit the success of discovery scans seeking industry 4.0 devices. this can also include access control lists on switches to prevent unauthorized devices from connecting to un-trusted devices or sensitive segments within the smart manufacturing network. additionally, this can include monitoring networks for unusual connections to servers outside the network, which may indicate compromise. also, this may mean placing all iiot devices on a separate virtual local area network (vlan) with its own special security restrictions. at the most basic level, proper physical security of these networked devices must be treated no different than any un-trusted device within the network.
as with almost all cyber security trends of the 21st century such as ransomware, rootkits and social media spear-phishing campaigns, there is almost no doubt that industry 4.0 (smart manufacturing/smart factory/iiot) will undergo attack from threat actors of all types. networks which host these systems must be designed to meet these threats as they exist today or postulated for years to come.
about the author: taylor welsh has worked as a cybersecurity specialist for the past 15 years at ax control inc. -- an automation control device service and supply company based out of north carolina. they specialize in new and obsolete drives, plcs, hmi and related control devices. along with being the former president of the north carolina infragard cyber club, taylor has worked in various capacities within cybersecurity, including government, defense, retail, manufacturing and startups. please show your appreciation for taylor’s article by visiting their website axcontrol.com.
to download a pdf copy of this article, see Cybersecurity-for-industry-4.0.pdf
 Gartner Internet of Things (IoT) Report
Copyright © 2018 - Business Industrial Network and https://bin95.com. All rights reserved.
Although, we do encourage you to share a link to this article, as the more who read it, the safer we all will be.
All trademarks and trade names are property of their respective owners.