As adoption of Industry 4.0 continues to grow and the requirement for remote maintenance and third-party access management systems increases, so does the need for cybersecurity solutions which address both operational technology (OT) and IT requirements – and which minimize the risk of unplanned downtime with its associated commercial and reputational issues.
Remote maintenance solutions for the industrial automation sector have over the past decade shown their worth through savings in travel costs and more responsive, optimized support from the machine providers’ service engineers.
In recent years, the increased productivity and competitiveness resulting from the use of these remote services have become more and more evident, and remote maintenance has become a key driver for many companies’ Industry 4.0 initiatives. Remote maintenance implies use of the internet, and the term Internet of Things (IoT) has become an important topic when planning and implementing industrial control system (ICS) strategies.
Today it is not unique to OT departments, but also involves IT departments due to the cybersecurity implications. In fact, the OT department now typically has much broader responsibility around security, whereas in the past, the dominating topic was safety. And within the area of security, the focus has shifted from primarily handling authentication, to the delivery of robust systems for authorization management.
Harnessing the true capability of Industrial IoT relies on the collaboration of experts in each domain; and leading suppliers such as Advantech work closely with partners with deep knowledge in the specific area to co-create optimized solutions to meet ever-changing customer requirements.
When it comes to secure remote access, a key phrase to consider is “With great power comes great responsibility”. Customers expect state-of-the-art technology to be paired with reliability: not only from the hardware perspective but also in the area of factory transformation. Remote connection is one of many areas where collaboration with innovative partners is delivering significant value for customers.
Secomea is an example of this, as an industrial IoT company that over the past decade or so has developed and refined a range of remote maintenance solutions and third-party access management systems which optimally combine security with ease of use. The philosophy behind this is that simple-to-use solutions will be less prone to human error and so the desired level of security will be maintained.
So, what should a company considering a remote access solution or third-party access management system look for to ensure the required degree of cybersecurity?
Firstly, the remote connections of both clients and IoT devices should be based on a solid, secure authentication design that must be able to prevent what is known as “Man-in-the-middle” attacks.
Secondly, any solution considered should be both security and Industry 4.0 certified, and be regularly audited by external security experts.
The solution should also have two-factor authentication as well as a user access management system where the owner can centrally control and authorize who has access to what equipment when and for how long, while concurrently logging all activity for access auditing.
It is wise to be wary of traditional VPN tunnel solutions, based on OpenVPN or IPSec. These VPN technologies are designed for providing full network access between two remote networks. However, this does not meet the IT security requirements of the modern factory. Solutions such as the Secomea Relay VPN are now available, which address the security and usability requirements of linking service engineers with industrial equipment. This type of solution also has the ability to provide access to only specific IP addresses and services, without having to configure firewall rules, and can be used with either a cloud-based or private M2M server.
Cybersecurity is a vital consideration in the modern factory, and all individuals must be aware of it and ensure it is properly implemented. Any laxity in this area can create a point of failure in the whole structure – something that no factory can afford. Implementing a solution which is simple to use for non-IT specialists is massive step towards minimizing cybersecurity risks resulting from human error, and so securing uninterrupted production and maintaining competitive advantage.