Securing the Industrial Internet of Things

The Industrial Internet of Things (IIoT) offers greater connectivity and benefits for users as it becomes more and more prominent in the automation and manufacturing industries. As a result, security has become more and more important.

01/14/2016


Greater connectivity means more knowledge, which means increased opportunities, and all of it revolves around security, according to John Herold, vice president of global industrial marketing at Belden.

"Security is one of the key points when we talk to industrial companies," Herold said during his presentation at the IEI Design Seminar in Schaumburg, Ill. "We have found security is a key entry point. It has to be thought of."

Herold made it clear greater connectivity is coming, and right now the buzz phrase is the Industrial Internet of Things (IIoT). With that increase in connectivity, the attack surface for the industrial sector skyrockets. That means security needs to have a stronger presence in the industry than it currently has.

While the talk around the industry centers around the IIoT, few have moved forward with thoughts and ideas on what users could do to reap the benefits from this movement toward greater connectivity. With the impact from the Internet of Things (IoT) expected to reach $11.1 trillion by 2025, Herold outlined five steps on how users could benefit:

These five steps are:

  1. Assess
  2. Migrate/update
  3. Proper design
  4. Protection
  5. Monitor

While he did talk about the five steps, keep in mind they all revolve around ensuring they remain secure. When it comes to the assess stage, users must know what they have, where it is, what it does, and who owns and manages it. In the mitigate/update stage, users should make Ethernet their foundation. "You need to consider security risks with each new connection to the system," Herold said.

In creating the right design, end users need to focus on the network and create a zones and conduit segmentation model. They must also understand the security risks and be able to benchmark the network against industry best practices. In the growth step, users can get caught in a cycle. Yes, they are growing, and that is a good thing, however, that also means they are more vulnerable. "There are internal risks, but also external risks," he said. At this point, part of the protection model calls for overlapping security.

"Overlapping security layers simply reduce risk," Herold said. "Learn which areas need to be protected. You will never be able to totally protect everything in your network, it would be way too expensive."

The fifth stage focuses on monitoring the network. "Technology changes, which means the network will change," he said. That means users need to make a plan which calls for regular maintenance, constantly monitoring the network, system failure alerts, and established response protocols.

"IIoT is real; it is not going away," Herold said. To take advantage, IIoT users "Need a sound infrastructure. We should be using real-time data; that is the key."

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information website covering safety and security issues in the manufacturing automation sector. This content originally appeared on ISSSource.com. Edited by Chris Vavra, production editor, CFE Media, cvavra@cfemedia.com.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me