Friday 7 January 2022

The first line of defense for industrial cybersecurity.

How to protect business assets from cyberthreats while keeping industrial operations up and running in the IIoT age explored by Alvis Chen, Global Marketing, Integrated Marketing Project Manager, Moxa.

In the IIoT era, previously unconnected systems are now connected over private or public networks in order to gain more insights and improve productivity. The downside of this greater connectivity is that industrial networks are no longer immune to cyberthreats. The upside is a growing chorus of experts who are sharing their knowledge to help shore up cybersecurity in industrial networks.

Generally speaking, two methods are available for implementing industrial cybersecurity. One method is to secure the foundation of a network infrastructure and only allow authorized traffic to flow to the designated areas. The other method involves identifying critical assets and applying layered protection. Industrial secure routers and firewalls are essential to both of these methods as they are deployed at the front lines to prevent unauthorized access and traffic to industrial networks.

Key Criteria for Choosing Industrial Secure Routers and Firewalls
Industrial control systems can apply a defense-in-depth approach to protect critical equipment and secure various locations, device cells, function zones, and factory sites on an automation network.

Defense-in-depth cybersecurity includes three types of controls: physical, technical, and administrative. First, implement physical controls by segmenting the network and creating boundaries between each segment. Next, apply technical controls by securing network traffic or filtering data packets. Lastly, enhance administrative security by managing IP addresses and adopting strong security policies. Secure routers and firewalls provide an excellent way to achieve defense-in-depth cybersecurity on your network, but how do you choose the right router or firewall for your industrial application? Consider the following three criteria.

1. Adding Firewalls Without Changing Your Network
Network segmentation involves breaking down the network into physical or logical zones with industrial firewalls. A firewall is an access control device that looks at the IP packet, compares the packet with preconfigured policy rules, and decides whether to allow, deny, or take some other action on the packet. Generally speaking, firewalls can be either routed or transparent, and the type you will need depends on the requirements of your application. Unlike routed firewalls, transparent firewalls allow you to keep the same subnet so that you can easily add firewalls to an existing network.

With transparent firewalls, you also do not need to change the network topology. Transparent firewalls are suitable for protecting critical devices or equipment inside a control network where network traffic is exchanged within a single subnet. Furthermore, you do not need to reconfigure IP subnets because transparent firewalls do not participate in the routing process.



2. Detect Threats and Protect Critical Data
Firewalls are akin to gatekeepers. Unfortunately, determined intruders may still be able to get through the gates on a segmented network. That’s why you need to constantly check the traffic that passes through the gates you have established. One way to achieve this is to filter out unwanted commands such as write or configure commands that could cause industrial processes to fail when needed or unnecessarily trigger a safe state during production.

Therefore, it is important for industrial secure routers and firewalls to support industrial protocol filtering at the command level -- read, write, etc. -- for more fine-grained whitelisting control. To secure the transmission of confidential data, consider building secure tunnels for site-to-site communications. In some scenarios, communications over public or untrusted networks will definitely require secure encrypted data transmissions. Under such circumstances, consider VPN capability when choosing industrial secure routers and firewalls.

3. Getting Firewalls and Network Under Control
In industrial applications, hundreds or thousands of firewalls could be installed to control data traffic and protect field equipment from malicious attacks. Furthermore, even more IP addresses could be on a network. As networks continue to expand, managing all of the devices, firewall rules, and IP addresses become more complicated. Therefore, network address translation (NAT) provides a very important function when deploying industrial secure routers and firewalls. NAT allows the reuse of machine IP address schemes on the same network and the connection of multiple devices to the Internet, using a smaller number of IP addresses. This not only significantly reduces maintenance efforts and administrative overhead, but also provides simple network segmentation. In addition, it enhances security for private networks by keeping internal addressing private from the external network.

Final Thoughts
Finding the right secure router or firewall for an application brings you to the halfway mark in successfully beefing up a industrial network security. Using three criteria to help you make the right choice can remove some of the guesswork. For instance, a highly integrated industrial multiport secure router with firewall/NAT/VPN and managed Layer 2 switch functions provides everything that is needed. Nevertheless, whatever solution you ultimately choose, it should fit the specific application requirements.

@MoxaInc @OConnell_PR #PAuto #Cybersecurity

No comments:

Post a Comment