Manufacturing is the second most commonly targeted industry by attackers and many attacks are successful due to the many vulnerabilities that exist in the manufacturing environment. This infographic depicts the common manufacturing cyber security misconceptions (DARES) and how to prepare, detect and recover from security threats to intellectual property in automation device programs (TRUTH.) Find out more on how you can protect your plant from threats and recover quickly from unauthorized changes: www.mdt-software.com/autosave-cybersecurity-solutions/
2. Manufacturing is the second most
commonly targeted industry by attackers and
many attacks are successful due to the many
vulnerabilities that exist in the
manufacturing environment.
3. Employees/contractors: In 2015, 60% of all attacks were carried out
by insiders; employees or anyone who has access to a company’s assets
(i.e. contractors.)1
Internetworking: New business models related to the Internet of Things
(IoT) have made manufacturers more vulnerable as both the industrial and
business networks are interconnected to the internet and no longer
separated, expanding the attack surface.
The automation layer: One of the easiest and successful way to
launch an attack in a manufacturing facility is to change an automation
device’s program data. “While a predefined set of process parameters can
be changed through HMI/SCADA applications, the logic maintained on the
controller defines the process flow and its safety settings. Therefore,
changing the controller logic is both the easiest and most successful way to
cause such disruption.”
[1] IBM X-Force® Research “2016 Cyber Security Intelligence Index”
[2] “Cyberthreats Targeting the Factory Floor” IndustryWeek article, Barak Perelman,
August 2016
4. Are these TRUTHS or DARES?
Firewalls
All you need is a properly configured firewall to protect the plant floor
Plant Floor Isolation
Our manufacturing Network is isolated from the outside world
IT Security
We can lock everything down so we are protected from malicious
software
5. Are these TRUTHS or DARES?
Proprietary Protocols
We don’t use much Ethernet protocol on the plant floor
Network Monitoring
All you need is a product that monitors the network
Backup Strategy
We back up our PLC programs to a shared folder on the network
6. All you need is a properly configured firewall to protect the plant floor
Our manufacturing Network is isolated from the outside world
We can lock everything down so we are protected from malicious
software
We don’t use much Ethernet protocol on the plant floor
All you need is a product that monitors the network
We back up our PLC programs to a shared folder on the network
DARE
DARE
DARE
DARE
DARE
DARE
7.
8. Regardless of how a threat occurs, only one
application gives you the ability to:
PREPARE
DETECT
RECOVER
Secure your program intellectual
property
Detect changes made outside the
change management system
Enable you to rapidly recover from
unauthorized changes
10. PREPARE
DETECT
RECOVER
Secure your program intellectual property
Detect changes made outside the change
management system
Enable you to rapidly recover from unauthorized
changes
AutoSave saves a copy of each program revision in a
central repository. Access to program folders and
programs is managed by via a flexible privileging
system.
AutoSave periodically compares the latest program
copy on file in AutoSave with the program running in
each device to identify any differences. If differences
are found, the appropriate people are notified with an
email highlighting the differences.
With an archive of all program revisions, you can
quickly restore the latest approved program after an
unauthorized change.