Security and Operational Technology/Smart Manufacturing

Pressemeldung der Firma Kuppinger Cole Ltd.

Industry 4.0 is the German government’s strategy to promote the computerization of the manufacturing industry. This strategy foresees that industrial production in the future will be based on highly flexible mass production processes that allow rich customization of products. This future will also include the extensive integration of customers and business partners to provide business and value-added processes. It will link production with high-quality services to create so-called “hybrid products”.

At the same time, in the US, the Smart Manufacturing Leadership Coalition is working on their vision for “Smart Manufacturing”. In 2013 the UK the Institute for Advanced Manufacturing, which is part of the University of Nottingham, received a grant of £4.6M for a study on Technologies for Future Smart Factories.

This vision depends upon the manufacturing machinery and tools containing embedded computer systems that will communicate with each other inside the enterprise, and with partners and suppliers across the internet. This computerization and communication will enable optimization within the organizations, as well as improving the complete value adding chain in near real time through the use of intelligent monitoring and autonomous decision making processes. This is expected to lead to the development of completely new business models as well as exploiting the considerable potential for optimization in the fields of production and logistics.

However there are risks, and organizations adopting this technology need to be aware of and manage these risks. Compromising the manufacturing processes could have far reaching consequences. These consequences include the creation of flawed or dangerous end products as well as disruption of the supply chain. Even when manufacturing processes based on computerized machinery are physically isolated they can still be compromised through maladministration, inappropriate changes and infected media. Connecting these machines to the internet will only increase the potential threats and the risks involved.

Here are some key points to securely exploiting this vision:

  • Take a Holistic Approach: the need for security is no longer confined to the IT systems, the business systems of record but needs to extend to cover everywhere that data is created, transmitted or exploited. Take a holistic approach and avoid creating another silo.
  • Take a Risk based approach: The security technology and controls that need to be built should be determined by balancing risk against rewards based on the business requirements, the assets at risk together with the needs for compliance as well as the organizational risk appetite. This approach should seek to remove identifiable vulnerabilities and put in place appropriate controls to manage the risks.
  • Trusted Devices: This is the most immediate concern since many devices that are being deployed today are likely to be in use, and hence at risk, for long periods into the future. These devices must be designed and manufactured to be trustworthy. They need an appropriate level of physical protection as well as logical protection against illicit access and administration. It is highly likely that these devices will become a target for cyber criminals who will seek to exploit any weaknesses through malware. Make sure that they contain protection that can be updated to accommodate evolving threats.
  • Trusted Data: The organization needs to be able to trust the data from this. It must be possible to confirm the device from which the data originated, and that this data has not been tampered with or intercepted. There is existing low power secure technology and standards that have been developed for mobile communications and banking, and these should be appropriately adopted or adapted to secure the devices.
  • Identity and Access Management – to be able to trust the devices and the data they provide means being able to trust their identities and control access. There are a number of technical challenges in this area; some solutions have been developed for some specific kinds of device however there is no general panacea. Hence it is likely that more device specific solutions will emerge and this will add to the general complexity of the management challenges.

More information on this subject can be found in Advisory Note: Security and the Internet of Everything and Everyone – 71152 – KuppingerCole



Firmenkontakt und Herausgeber der Meldung:
Kuppinger Cole Ltd.
Sonnenberger Str. 16
65191 Wiesbaden
Telefon: +49 (211) 237077-0
Telefax: +49 (211) 237077-11
http://www.kuppingercole.com



Dateianlagen:
KuppingerCole, gegründet im Jahr 2004, ist ein führendes globales Analystenunternehmen mit Hauptsitz in Europa mit Schwerpunkt auf Information Security und Identity und Access Management (IAM). Ein weiterer Kernbereich des KuppingerCole Researchs bildet Governance, Risk Management and Compliance (GRC). Unsere sehr erfahrenen Analysten wissen, wie man einen signifikanten Mehrwert für Unternehmen durch Lösungen für Informationssicherheit und Privacy generieren kann - für on-premise-Anwendungen, Cloud-Lösungen, mobile Zugriffe und Social Computing-Plattformen. KuppingerCole steht für Expertise, Thought Leadership, Neutralität und für einen ausgeprägten Praxisbezug und unterstützt damit Anwenderunternehmen, Integratoren und Softwarehersteller sowohl bei taktischen als auch strategischen Herausforderungen. Die Balance zwischen unmittelbarer Umsetzbarkeit und Zukunftssicherheit prägt das Handeln von KuppingerCole. Gemeinsam mit dem Unternehmensgründer Martin Kuppinger beobachten die hoch qualifizierten und weltweit angesehenen KuppingerCole Analysten kontinuierlich den Markt und stellen ihre Expertise in Form von aktuellen Research Notes und durch herstellerneutraler Beratung ("Trusted Advisory") zur Verfügung. Zu den Analysten gehören neben Martin Kuppinger unter anderen der Identity & Access Management Experte Matthias Reinwarth, die Informationssicherheitsexperten Mike Small, Amar Singh, Dr. Eric Cole und Alexei Balaganski, die Infrastruktur- und Projektexperten Dr. Horst Walther, Dr. David Goodman und Rob Newby, die Privacy und Datenschutzexperten Dr. Karsten Kinast und Dr. Scott David sowie das Identity Management-Urgestein Dave Kearns. Als unabhängige Analystengruppe organisiert KuppingerCole Konferenzen, Workshops und Webcasts im Bereich Informationssicherheit, IAM und Cloud und ist Ausrichter der European Identity & Cloud Conference, die sich als die führende Veranstaltung für Meinungsführerschaft und Best Practices für Identity & Access, Cloud und Digital Risk in Europa etabliert hat.


Weiterführende Links

Für die oben stehende Pressemitteilung ist allein der jeweils angegebene Herausgeber (siehe Firmenkontakt oben) verantwortlich. Dieser ist in der Regel auch Urheber des Pressetextes, sowie der angehängten Bild-, Ton-, Video-, Medien- und Informationsmaterialien. Die Huber Verlag für Neue Medien GmbH übernimmt keine Haftung für die Korrektheit oder Vollständigkeit der dargestellten Meldung. Auch bei Übertragungsfehlern oder anderen Störungen haftet sie nur im Fall von Vorsatz oder grober Fahrlässigkeit. Die Nutzung von hier archivierten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Eine systematische Speicherung dieser Daten sowie die Verwendung auch von Teilen dieses Datenbankwerks sind nur mit schriftlicher Genehmigung durch die Huber Verlag für Neue Medien GmbH gestattet.