SlideShare a Scribd company logo
1 of 20
Make it smart, make it safer!
Reaping the Benefits of the Industrial Internet of Things
(IIOT) and embracing the future of manufacturing.
Maxi Tsai / 蔡昌益
Director, High Tech Business Unit
© 2017 CSA Group Management Corp. All Rights Reserved.
www.csagroup.org
CSA Group
2
www.csagroup.org
Flexible &
Responsive
Lead
Innovations
Customer
Centric
Humanity
Sustainable
Prosperity
In 2020, at least 50 billion
devices will be connected to
the Internet, a significant
share of the them will be in
the future production
process. Equipped with
sensors and actors,
machines see you and
shape the decision making
process to better serve you.
IT-OT
Convergence
is the key to success.
Smart Manufacturing System
“
www.csagroup.org
Opportunities and Challenges
4
“No single set of Standards,
Regulations and forms of
Certifications.
* Industry 4.0 – Opportunities and Challenges of the Industrial Internet,
pwc, Dec. 2014
HUMAN-MACHINE COLLABORATION
www.csagroup.org
Case Study: Is the “Robot Tamer” safely protected?
5
Control Industrial Machines With Simple Gestures
*https://vimeo.com/channels/staffpicks/148982525
www.csagroup.org
IT meets OT @ Industrial Control System (ICS)
Operations Technology (OT)
• “Is hardware and software that
detects or causes a change
through the direct monitoring
and/or control of physical
devices, processes and events
in the enterprise.”
Information Technology (IT)
• “The entire spectrum of
technologies for information
processing, including software,
hardware, communications
technologies and related
services. In general, IT does not
include embedded technologies
that do not generate data for
enterprise use.”
6
www.csagroup.org
OT vs. IT through manufacturing process
7
www.csagroup.org
Safety/Security Principles in OT & IT
8
Operations
Technology (OT)
Information
Technology (IT)
Security
Confidentiality
Integrity
Availability
Safety
+ Importance Importance +
www.csagroup.org
Safety & Security protecting the ICS from failures
Safety
• To	protect	systems	from	accidental	
failures	to	avoid	hazards.
Security
• Focus	on	protecting	systems	from	
failures	through	intentional	
malicious	attacks.
9
ICS	is	only	as	Safe	as	it	is	Secure.
Functional Safety for ICS
IEC 61508 Product and Company/System Certification
10
www.csagroup.org
Functional Safety Standards vs. Product Segments
11
Consumer	Products	,
motors	and	generators	(C22.2	no.	
77,	100,	UL1004,2111),
X X X 	 	
	
	
Fuel	Cell	Power	Systems	-	stnry	
ANSI/CSA	FC1	UL991
X X
lighting	equipment x x
Portable	tools	 X X 	 X X 	
temperature	Indicating	and	
regulating	devices.	
X X
Limits	controls	(UL	353,	CSA	24) X
electronically	operated	valves X X
Appliances,	cooking	range	controls X X X X X X
Smart	sensors,	PLC,	LS,	valves,	
actuators,	beacon,	sounders,	
safety	relays,	switches,circuit	
	 X X X 	 X X X X X 	 	
EPC,	System	Integrator,	safety	
product	manufacturer
X X X x x x X
X
	 	 	 X 	
Gas	&	Flame	detectors,	SILS X X X 	 X X X X
Automatic	electrical	controls	for	
house	hold	&	Industrial	gas	burner,	
CSA	-C22.2	no.	60730-2-5;
	 X X X 	 	
X
	
Safety	Devices,	to	support	Ex	
equipment,	ie	,	motors	etc
X X X 	 	 	 X X X X 	 	
Risk	Assessment 	 	 X X 	 	 	
Safety	of	Machinery,	decoder,	
scanner,	automatic	door	/	garage	
/gates
X X X X X X X
Safety	laser	scanner,	safety	light	
curtains
X X X
Veriable	speed	controller.	 X X 	
Safety	of	Robots X X X X X X X
Lifts,	elevators X
Diesel	/	battery	engine/F	lift X X X X
Battery	storage X
Medical	Devices	 X X
Functional	
Safety	Sectors		vs.		Standards
2017-05-10
EN	298,	EN	13611,	CSA	
60730-2-5
UL	858A
EN	ISO	13482:2014
EN	50402
IEC/CSA/ISA	60079-29-1
EN	13611
CSA	B44/ASME	A17.1
IEC	62304	(SW)
CSA	No.	0.8-12
UL	1998,		UL	991
CSA/	UL/	60730-1	anx	H
IEC	60730-1	Ed.	4	&	5
CSA	E60335-1
IEC	61508	(1,2),	FSM,HW
FS	Standards,	Home	&	COM
commercial,	Appliances	
IEC	62061
ISO	13849-1
IEC	61508-3		SW
IEC	61511-1
ISO	12100
CSA	205-12
IEC	62841-1
CSA	139-113
CSA	FC	1-3	2014
IECEx:	IEC	60079-33
EN	1755
EN	50271
IEC	60204
CSA	NO.	301-16
IEC	61496
EN	12978	/	EN	16005
	CSA	60601-1	Ed.	3.1
FS	Standards,	INDUSTRIAL
PROCESS MACHINERY
	
IEC	61800-5-2
UL	1973	/UL	9540
ATEX,	IECEx,	Ordinary	Location
FUNCTIONAL	SAFETY,	HAZLOC FS
medical
UL	1740,	ISO	10218
ATEX:	EN	50495
IECEx:	IEC	60079-42
www.csagroup.org
Functional Safety Assessment to IEC 61508
12
PRODUCT Certification
HARDWARE
SAFETY
ASSESSMENT
USING FMEDA
SYSTEMATIC
CAPABILITY
USING CASS
METHODOLOGY
PRODUCE
CERTIFICATE
INDEPENDANTLY
ASSESSED
ISSUE
CERTIFICATE
www.csagroup.org
Functional Safety Assessment to IEC 61508
13
GAP
ASSESSMENT
Processes and
Procedures
Audit Functional
Safety Management
(Hardware / Software
Capability)
USING CASS
METHODOLOGY
PRODUCE
CERTIFICATE
INDEPENDANTLY
ASSESSED
ISSUE
CERTIFICATE
COMPANY Certification
Cybersecurity for ICS
ISA 99 / IEC 62443-x family
14
www.csagroup.org
Overview of ISA 99 / IEC 62443-x family
General
Policies&
Procedures
SystemComponent
Master glossary of
terms and
abbreviations
ISA – 62443-1-2
Terminology,
concepts and
models
ISA – 62443-1-1
System security
compliance metrics
ISA – 62443-1-3
Security lifecycle
and use-case
ISA – 62443-1-4
Security levels for
zones and conduits
ISA – TR62443-3-2
Security
technologies
ISA – TR62443-3-1
System security
requirements and
security levels
ISA – TR62443-3-3
Technical security
requirements for
components
ISA – TR62443-4-2
Product
development
requirements
ISA – TR62443-4-1
Implementation
guidance
ISA – 62443-2-2
Requirements
ISA – 62443-2-1
Patch management
in the environment
ISA – 62443-2-3
Requirements for
solution suppliers
ISA – 62443-2-4
www.csagroup.org
Certifications Available
Process Certification:
• IEC 62443-4-1
Security
Development
Lifecycle Assurance
(SDLA)
Product Certification:
• IEC 62443-4-2
• IEC 62443-4-1
Embedded Device
Security Assurance
(EDSA)
Product Certification:
• IEC 62443-3-3
• IEC 62443-4-1
• IEC 62443-4-2
System Security
Assurance (SSA)
www.csagroup.org
CSA Group Cybersecurity Services
• Gap Analysis
– Evaluation of the maturity of cybersecurity controls implemented in product, service or company
– Determines the overall areas of cybersecurity weakness and necessary improvements
– Evaluation to following standards:
• ISO/IEC 62443
• ISO/IEC 27001
• ISO/IEC 27034
• UL2900
• Security Development Lifecycle Assurance (SDLA)
– Framework defines the process used to build a product from inception to decommission
– Product is developed, maintained and decommissioned with “secure by design” approach
– Engage early in design stage
• Embedded Device Security Assurance (EDSA)
– Third-party assurance on the security of embedded devices and device supplier’s development
process
– Examine how well embedded device meets ISA Secure EDSA specifications.
– Includes three elements:
• Functional Security Assessment (FSA)
• Software Development Security Assessment (SDSA)
• Communication Robustness Testing (CRT)
• Bench Testing
– Independent product testing in a lab environment for known vulnerabilities
– Tests product robustness & resilience against known cyber-attacks
– Testing only without attestation
www.csagroup.org
“Be an Enabler to help our
customers to succeed.
ü in various ways to support you:
- training & bootcamp;
- gap analysis for existing product design;
- certifications for worldwide market access.
CSA Group
www.csagroup.org
Your most trusted advisors
• China/Asia:
– Gary Lin (gary.lin@csagroup.org)
• Europe:
– Rene Bienwald (rene.bienwald@csagroup.org)
• North America:
– Wesley Meiers (wesley.meiers@csagroup.org)
Smart Manufacturing

More Related Content

What's hot

Smart Factory Using Smart Manufacturing
Smart Factory Using Smart ManufacturingSmart Factory Using Smart Manufacturing
Smart Factory Using Smart ManufacturingSatjitkumar
 
Smart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsSmart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsUnmesh Ballal
 
Smart manufacturing and a iot
Smart manufacturing and a iotSmart manufacturing and a iot
Smart manufacturing and a iotDaniel Li
 
Siemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfSiemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfAlekseySolomin
 
On The Way To Smart Factory
On The Way To Smart FactoryOn The Way To Smart Factory
On The Way To Smart FactoryDell World
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energyBayu imadul Bilad
 
Smart manufacturing
Smart manufacturingSmart manufacturing
Smart manufacturingJ A Bhavsar
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)3G4G
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcjvivek joshi
 
Industry 4.0 Smart factory Application Story
Industry 4.0 Smart factory Application StoryIndustry 4.0 Smart factory Application Story
Industry 4.0 Smart factory Application StoryICPDAS
 
Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0Pramod kathamore
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of ThingsConnected Futures
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 

What's hot (20)

Smart Factory Using Smart Manufacturing
Smart Factory Using Smart ManufacturingSmart Factory Using Smart Manufacturing
Smart Factory Using Smart Manufacturing
 
Smart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation SolutionsSmart manufacturing – Industrial Automation Solutions
Smart manufacturing – Industrial Automation Solutions
 
Smart manufacturing and a iot
Smart manufacturing and a iotSmart manufacturing and a iot
Smart manufacturing and a iot
 
Cyber physical manufacturing systems
Cyber physical manufacturing systemsCyber physical manufacturing systems
Cyber physical manufacturing systems
 
Overview on Industry 4.0
Overview on Industry 4.0Overview on Industry 4.0
Overview on Industry 4.0
 
Siemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdfSiemens_2022_JPM-Digital-Twin-Conference.pdf
Siemens_2022_JPM-Digital-Twin-Conference.pdf
 
On The Way To Smart Factory
On The Way To Smart FactoryOn The Way To Smart Factory
On The Way To Smart Factory
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energy
 
Iot applications in manufacturing
Iot applications in manufacturingIot applications in manufacturing
Iot applications in manufacturing
 
Smart manufacturing
Smart manufacturingSmart manufacturing
Smart manufacturing
 
Industry 4.0 and Smart Factory
Industry 4.0 and Smart FactoryIndustry 4.0 and Smart Factory
Industry 4.0 and Smart Factory
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)
 
What is a smart factory
What is a smart factoryWhat is a smart factory
What is a smart factory
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcj
 
Industry 4.0 Smart factory Application Story
Industry 4.0 Smart factory Application StoryIndustry 4.0 Smart factory Application Story
Industry 4.0 Smart factory Application Story
 
Industrial engineering 4.0
Industrial engineering 4.0Industrial engineering 4.0
Industrial engineering 4.0
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Industry 4.0
Industry 4.0 Industry 4.0
Industry 4.0
 
Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 

Similar to Smart Manufacturing

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
UL's guide to differentiate your wearables from competition
UL's guide to differentiate your wearables from competitionUL's guide to differentiate your wearables from competition
UL's guide to differentiate your wearables from competitionCSA Group
 
Internet of Things Case Study
Internet of Things Case StudyInternet of Things Case Study
Internet of Things Case StudyABHISHEK LABH
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systemsevatjohnson
 
Utilities Monitoring System - energy, water, gas, compressed air
Utilities Monitoring System - energy, water, gas, compressed airUtilities Monitoring System - energy, water, gas, compressed air
Utilities Monitoring System - energy, water, gas, compressed airMrs.Shanaz Akter
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical DeviceICS
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsICS
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 

Similar to Smart Manufacturing (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
UL's guide to differentiate your wearables from competition
UL's guide to differentiate your wearables from competitionUL's guide to differentiate your wearables from competition
UL's guide to differentiate your wearables from competition
 
Internet of Things Case Study
Internet of Things Case StudyInternet of Things Case Study
Internet of Things Case Study
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
 
Utilities Monitoring System - energy, water, gas, compressed air
Utilities Monitoring System - energy, water, gas, compressed airUtilities Monitoring System - energy, water, gas, compressed air
Utilities Monitoring System - energy, water, gas, compressed air
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Manufacturing Hacks
Manufacturing HacksManufacturing Hacks
Manufacturing Hacks
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Smart Manufacturing

  • 1. Make it smart, make it safer! Reaping the Benefits of the Industrial Internet of Things (IIOT) and embracing the future of manufacturing. Maxi Tsai / 蔡昌益 Director, High Tech Business Unit © 2017 CSA Group Management Corp. All Rights Reserved.
  • 3. www.csagroup.org Flexible & Responsive Lead Innovations Customer Centric Humanity Sustainable Prosperity In 2020, at least 50 billion devices will be connected to the Internet, a significant share of the them will be in the future production process. Equipped with sensors and actors, machines see you and shape the decision making process to better serve you. IT-OT Convergence is the key to success. Smart Manufacturing System “
  • 4. www.csagroup.org Opportunities and Challenges 4 “No single set of Standards, Regulations and forms of Certifications. * Industry 4.0 – Opportunities and Challenges of the Industrial Internet, pwc, Dec. 2014 HUMAN-MACHINE COLLABORATION
  • 5. www.csagroup.org Case Study: Is the “Robot Tamer” safely protected? 5 Control Industrial Machines With Simple Gestures *https://vimeo.com/channels/staffpicks/148982525
  • 6. www.csagroup.org IT meets OT @ Industrial Control System (ICS) Operations Technology (OT) • “Is hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise.” Information Technology (IT) • “The entire spectrum of technologies for information processing, including software, hardware, communications technologies and related services. In general, IT does not include embedded technologies that do not generate data for enterprise use.” 6
  • 7. www.csagroup.org OT vs. IT through manufacturing process 7
  • 8. www.csagroup.org Safety/Security Principles in OT & IT 8 Operations Technology (OT) Information Technology (IT) Security Confidentiality Integrity Availability Safety + Importance Importance +
  • 9. www.csagroup.org Safety & Security protecting the ICS from failures Safety • To protect systems from accidental failures to avoid hazards. Security • Focus on protecting systems from failures through intentional malicious attacks. 9 ICS is only as Safe as it is Secure.
  • 10. Functional Safety for ICS IEC 61508 Product and Company/System Certification 10
  • 11. www.csagroup.org Functional Safety Standards vs. Product Segments 11 Consumer Products , motors and generators (C22.2 no. 77, 100, UL1004,2111), X X X Fuel Cell Power Systems - stnry ANSI/CSA FC1 UL991 X X lighting equipment x x Portable tools X X X X temperature Indicating and regulating devices. X X Limits controls (UL 353, CSA 24) X electronically operated valves X X Appliances, cooking range controls X X X X X X Smart sensors, PLC, LS, valves, actuators, beacon, sounders, safety relays, switches,circuit X X X X X X X X EPC, System Integrator, safety product manufacturer X X X x x x X X X Gas & Flame detectors, SILS X X X X X X X Automatic electrical controls for house hold & Industrial gas burner, CSA -C22.2 no. 60730-2-5; X X X X Safety Devices, to support Ex equipment, ie , motors etc X X X X X X X Risk Assessment X X Safety of Machinery, decoder, scanner, automatic door / garage /gates X X X X X X X Safety laser scanner, safety light curtains X X X Veriable speed controller. X X Safety of Robots X X X X X X X Lifts, elevators X Diesel / battery engine/F lift X X X X Battery storage X Medical Devices X X Functional Safety Sectors vs. Standards 2017-05-10 EN 298, EN 13611, CSA 60730-2-5 UL 858A EN ISO 13482:2014 EN 50402 IEC/CSA/ISA 60079-29-1 EN 13611 CSA B44/ASME A17.1 IEC 62304 (SW) CSA No. 0.8-12 UL 1998, UL 991 CSA/ UL/ 60730-1 anx H IEC 60730-1 Ed. 4 & 5 CSA E60335-1 IEC 61508 (1,2), FSM,HW FS Standards, Home & COM commercial, Appliances IEC 62061 ISO 13849-1 IEC 61508-3 SW IEC 61511-1 ISO 12100 CSA 205-12 IEC 62841-1 CSA 139-113 CSA FC 1-3 2014 IECEx: IEC 60079-33 EN 1755 EN 50271 IEC 60204 CSA NO. 301-16 IEC 61496 EN 12978 / EN 16005 CSA 60601-1 Ed. 3.1 FS Standards, INDUSTRIAL PROCESS MACHINERY IEC 61800-5-2 UL 1973 /UL 9540 ATEX, IECEx, Ordinary Location FUNCTIONAL SAFETY, HAZLOC FS medical UL 1740, ISO 10218 ATEX: EN 50495 IECEx: IEC 60079-42
  • 12. www.csagroup.org Functional Safety Assessment to IEC 61508 12 PRODUCT Certification HARDWARE SAFETY ASSESSMENT USING FMEDA SYSTEMATIC CAPABILITY USING CASS METHODOLOGY PRODUCE CERTIFICATE INDEPENDANTLY ASSESSED ISSUE CERTIFICATE
  • 13. www.csagroup.org Functional Safety Assessment to IEC 61508 13 GAP ASSESSMENT Processes and Procedures Audit Functional Safety Management (Hardware / Software Capability) USING CASS METHODOLOGY PRODUCE CERTIFICATE INDEPENDANTLY ASSESSED ISSUE CERTIFICATE COMPANY Certification
  • 14. Cybersecurity for ICS ISA 99 / IEC 62443-x family 14
  • 15. www.csagroup.org Overview of ISA 99 / IEC 62443-x family General Policies& Procedures SystemComponent Master glossary of terms and abbreviations ISA – 62443-1-2 Terminology, concepts and models ISA – 62443-1-1 System security compliance metrics ISA – 62443-1-3 Security lifecycle and use-case ISA – 62443-1-4 Security levels for zones and conduits ISA – TR62443-3-2 Security technologies ISA – TR62443-3-1 System security requirements and security levels ISA – TR62443-3-3 Technical security requirements for components ISA – TR62443-4-2 Product development requirements ISA – TR62443-4-1 Implementation guidance ISA – 62443-2-2 Requirements ISA – 62443-2-1 Patch management in the environment ISA – 62443-2-3 Requirements for solution suppliers ISA – 62443-2-4
  • 16. www.csagroup.org Certifications Available Process Certification: • IEC 62443-4-1 Security Development Lifecycle Assurance (SDLA) Product Certification: • IEC 62443-4-2 • IEC 62443-4-1 Embedded Device Security Assurance (EDSA) Product Certification: • IEC 62443-3-3 • IEC 62443-4-1 • IEC 62443-4-2 System Security Assurance (SSA)
  • 17. www.csagroup.org CSA Group Cybersecurity Services • Gap Analysis – Evaluation of the maturity of cybersecurity controls implemented in product, service or company – Determines the overall areas of cybersecurity weakness and necessary improvements – Evaluation to following standards: • ISO/IEC 62443 • ISO/IEC 27001 • ISO/IEC 27034 • UL2900 • Security Development Lifecycle Assurance (SDLA) – Framework defines the process used to build a product from inception to decommission – Product is developed, maintained and decommissioned with “secure by design” approach – Engage early in design stage • Embedded Device Security Assurance (EDSA) – Third-party assurance on the security of embedded devices and device supplier’s development process – Examine how well embedded device meets ISA Secure EDSA specifications. – Includes three elements: • Functional Security Assessment (FSA) • Software Development Security Assessment (SDSA) • Communication Robustness Testing (CRT) • Bench Testing – Independent product testing in a lab environment for known vulnerabilities – Tests product robustness & resilience against known cyber-attacks – Testing only without attestation
  • 18. www.csagroup.org “Be an Enabler to help our customers to succeed. ü in various ways to support you: - training & bootcamp; - gap analysis for existing product design; - certifications for worldwide market access. CSA Group
  • 19. www.csagroup.org Your most trusted advisors • China/Asia: – Gary Lin (gary.lin@csagroup.org) • Europe: – Rene Bienwald (rene.bienwald@csagroup.org) • North America: – Wesley Meiers (wesley.meiers@csagroup.org)