WITH INDUSTRY 4.0 COMES A NEW ERA OF IT SECURITY RISKS

 

The digital transformation to Industry 4.0 means opportunities, making progress and looking towards the future. But with it comes significant IT security risks. Why? Because increased networking in industrial plants using IP (Internet Protocol) includes standardised hardware and software components for control and instrumentation technology.

The IEC 62443 series of standards ("Industrial communication networks – IT security for networks and systems") proposes countermeasures and is internationally regarded as the standard for proof of conformity in matters of cybersecurity for the process and automation industry. In addition, specialists around the globe are developing new local laws and regulations to optimise the security of industrial plants. This much is clear: Manufacturers should invest in systems that are secure by design and secure by default.

Security by Design and Security by Default: Eliminating risk factors

 

"Security by Design" is an approach whereby the security-related requirements of hardware and software are taken into account during product development in order to eliminate security gaps early on and reduce costs. This is because eliminating risk factors is more expensive once the project is already underway.

The aim of "Security by Default", on the other hand, is to create a standard configuration that ensures the highest possible level of security and data protection within an IT system and thus builds trust. This is why the technical specifications of asset administration shells allow for contents to be digitally signed and meet the basic principles of both Security by Design and Security by Default.

But what is a digital signature? A digital signature is a cryptographic form of an electronic signature that makes it possible to digitally sign documents. It makes it possible to confirm the identity of the signatory and provides evidence of the integrity of the electronic message. The digital signature uses cryptographic methods based on both private and public keys. Should users make any changes to the standard configurations, they have a responsibility to check for any possible impacts on security.