当前位置:网站首页>How to ensure the security of smart factories?
How to ensure the security of smart factories?
2022-08-02 20:34:00 【software testnet】

在某些情况下,缺乏技能、Policy and sensitivity of employees will make problems become more complicated.In order to make the intelligent plant project a success,Need to make sure that the results,并将“安全”As one of the pillars of the core of the digital transformation work.
Security challenges and upgrade to smart factory:
- To operate the lack of adequate visibility.
- Network security priorities is not regarded as the core operation、Part of the risk and quality control process.
- 风险、The threat and impact assessment not as strict as safety assessment and frequent.
- Each digital unit face the threat of extension or connection device to add,Did not calculate or is used to calculate the increased risk of any.
- Asset inventory didn't get serious maintenance.
- Assets related to the patch and vulnerability assessment and the network condition.
- Safety investment is interlaced and passive.
- Security team skills upgrading is usually not the planned activities.
- Data from the safety related dashboard usually are not considered for resources and the efficiency of management in areas such as decision.
因此,Although smart factory by injection technology in a safe area and made substantial achievements,但“安全”As an important factor of intelligent production has not been due attention.This trend clearly reflect the digital factory has already become the vulnerable of hackers and criminals target.Hacker groups constantly scanning and placed new malware andBumblebeeSuch as loaders more,In order to steal data and ransom.
Why hackers intelligent factory?
- As part of a proof-of-concept project,Intelligent factories are at the tip of the innovation,Host multiple without testing equipment and assets.
- 从本质上讲,Industrial iot projects designed to collect data and to strengthen the control of various components.
- Design a lack of security.
- In the first few stages of intelligent plant project,Incorporating safety data flow and unsafe data flow.This creates a new threat surface,Hackers can easily detect and use.
- Intelligent plant contains unique intellectual property application,You can copy and sell it to potential buyers.
- The fusion of technology created a fragile environment.
How to ensure the safety of smart factory
Before starting for smart factory improve network security,Need to answer these basic but important network security problem:
- What is the most ideal state of security?虽然“0违规”是一个答案,But please try to otherKPIWith the basis of widely,And there he put the response in the background,So as not to miss any operating the necessity of safety.
- What safety regulations to abide by the requirements?By what standard can be in operation efficiency and transparency、检测效率、Business continuity and so on have a big impact on the business?
- What is the challenge for the current security operations team?Whether team faceSOC/Detection of fatigue?
- To have a good knowledge about whether the threat of operating range?
- Is currently tracking what kind ofKPI,是否足够?
- The current budget is enough?
- Whether there is sufficient manpower to deal with all security needs?
这些问题的答案,Will provide the need to take the first step in,To ensure the safety of enterprise.
Early attention has its benefits
理想情况下,“安全”Should be started from the design stage.When the project is still in the stage of at least,Should be considered and finally determine the industrial iot security governance mechanism、(Key personnel)Roles and responsibilities as well as the detection and prevention solutions.我们经常看到,Different team for smart factory the threat to the environment is different understanding and awareness of the.因此,Coordination work to achieve the consensus of the governance model is very important.Policy and framework,如OTNetwork security policy template orIEC62443,NISTRoles and responsibilities table template,Will greatly help to network security posture ascend to a new level.
To ensure that the response to violations, in an attempt to maturity is another strategic priority.In the final model of governance and security,Should be deployed and governance model andSOCInfrastructure integration violation detection solutions.Because of the threat is not wait until everything is in place to attack some parts of the intelligent factory,Must therefore be deployed to detect and remedy to cope with these threats,这一点很重要.Once finalized the governance model,You can according to the selected model will solutions consistent with the expected result.
For any signs of network intrusion attempts to attack or,Defense and response plan can play a big role in the first response.The scheme can be defined attack scenarios,Can even suggested that the basic network health strategy,Can be deployed in the first place,In order to prevent the invasion of.
Here are some other steps can take,To ensure the safety of the intelligent factory.
- The threat of a thorough evaluation and vulnerabilities affect audit,To identify and fill the security holes.
- Maintenance equipment and assets list,To record all assets,Including each device patches and security status.
- 采用NIST和IEC62443标准.
- 每90-120Day a network security training.Employees should be aware of the environmental threats, and the impact of these threats commitment to the operation and production.
- 每90Days on a security audit.
- Sum of all measuring equipment series.
- In the evaluation of supply chain security threats.
- Deployed decoy and cheat solution to transfer and the study of complex attack.
- Formulate and publish security governance policies.
边栏推荐
猜你喜欢

MySQL基本操作和基于MySQL基本操作的综合实例项目

Flink学习9:配置idea开发flink-Scala程序环境

Wechat Gymnasium Appointment Mini Program Graduation Design Finished Work (5) Task Book

打补丁的日子,比写代码的日子难熬多了

牛津硕士进碳圈,高瓴红杉经纬一起投了

土巴兔IPO五次折戟,互联网家装未解“中介”之痛

redis总结_分布式缓存

宝塔搭建实测-基于ThinkPHP5.1的wms进销存源码

Security First: Tools You Need to Know to Implement DevSecOps Best Practices

解决多版本jar包冲突问题
随机推荐
IDEA相关配置(特别完整)看完此篇就将所有的IDEA的相关配置都配置好了、设置鼠标滚轮修改字体大小、设置鼠标悬浮提示、设置主题、设置窗体及菜单的字体及字体大小、设置编辑区主题、通过插件更换主题
【21天学习挑战赛学习打卡】顺序查找
年轻人接棒大妈,金价跌回“4字头”,七夕迎黄金消费小热潮
Since September, China has granted zero-tariff treatment to 98% of tax items from 16 countries including Togo
创新云集技术咖,工赋汇聚实战派:2022工赋开发者峰会
Flink Learning 9: Configure the idea to develop the flink-Scala program environment
土巴兔IPO五次折戟,互联网家装未解“中介”之痛
CUDA+Pycharm-gpu版本+Anaconda安装
使用lodash替换js字符串中的变量
究极异常处理逻辑——多层次异常的处理顺序
STL案例-招聘新员工
IReport常见问题及处理方法
启航
golang源码分析(19)简单编译器-计算器
Google Earth Engine APP—— 一个不用写代码可以直接下载相应区域的1984-2021年的GIF遥感影像动态图
分布式 | dble 启动的时候做了什么之配置检测
erp系统和wms系统有什么区别
Mini Program Graduation Works WeChat Gymnasium Reservation Mini Program Graduation Design Finished Product (8) Graduation Design Thesis Template
红队实战靶场ATT&CK(一)
今年上半年,我国公路建设总体形势持续向好