当前位置:网站首页>How to ensure the security of smart factories?
How to ensure the security of smart factories?
2022-08-02 20:34:00 【software testnet】
在某些情况下,缺乏技能、Policy and sensitivity of employees will make problems become more complicated.In order to make the intelligent plant project a success,Need to make sure that the results,并将“安全”As one of the pillars of the core of the digital transformation work.
Security challenges and upgrade to smart factory:
- To operate the lack of adequate visibility.
- Network security priorities is not regarded as the core operation、Part of the risk and quality control process.
- 风险、The threat and impact assessment not as strict as safety assessment and frequent.
- Each digital unit face the threat of extension or connection device to add,Did not calculate or is used to calculate the increased risk of any.
- Asset inventory didn't get serious maintenance.
- Assets related to the patch and vulnerability assessment and the network condition.
- Safety investment is interlaced and passive.
- Security team skills upgrading is usually not the planned activities.
- Data from the safety related dashboard usually are not considered for resources and the efficiency of management in areas such as decision.
因此,Although smart factory by injection technology in a safe area and made substantial achievements,但“安全”As an important factor of intelligent production has not been due attention.This trend clearly reflect the digital factory has already become the vulnerable of hackers and criminals target.Hacker groups constantly scanning and placed new malware andBumblebeeSuch as loaders more,In order to steal data and ransom.
Why hackers intelligent factory?
- As part of a proof-of-concept project,Intelligent factories are at the tip of the innovation,Host multiple without testing equipment and assets.
- 从本质上讲,Industrial iot projects designed to collect data and to strengthen the control of various components.
- Design a lack of security.
- In the first few stages of intelligent plant project,Incorporating safety data flow and unsafe data flow.This creates a new threat surface,Hackers can easily detect and use.
- Intelligent plant contains unique intellectual property application,You can copy and sell it to potential buyers.
- The fusion of technology created a fragile environment.
How to ensure the safety of smart factory
Before starting for smart factory improve network security,Need to answer these basic but important network security problem:
- What is the most ideal state of security?虽然“0违规”是一个答案,But please try to otherKPIWith the basis of widely,And there he put the response in the background,So as not to miss any operating the necessity of safety.
- What safety regulations to abide by the requirements?By what standard can be in operation efficiency and transparency、检测效率、Business continuity and so on have a big impact on the business?
- What is the challenge for the current security operations team?Whether team faceSOC/Detection of fatigue?
- To have a good knowledge about whether the threat of operating range?
- Is currently tracking what kind ofKPI,是否足够?
- The current budget is enough?
- Whether there is sufficient manpower to deal with all security needs?
这些问题的答案,Will provide the need to take the first step in,To ensure the safety of enterprise.
Early attention has its benefits
理想情况下,“安全”Should be started from the design stage.When the project is still in the stage of at least,Should be considered and finally determine the industrial iot security governance mechanism、(Key personnel)Roles and responsibilities as well as the detection and prevention solutions.我们经常看到,Different team for smart factory the threat to the environment is different understanding and awareness of the.因此,Coordination work to achieve the consensus of the governance model is very important.Policy and framework,如OTNetwork security policy template orIEC62443,NISTRoles and responsibilities table template,Will greatly help to network security posture ascend to a new level.
To ensure that the response to violations, in an attempt to maturity is another strategic priority.In the final model of governance and security,Should be deployed and governance model andSOCInfrastructure integration violation detection solutions.Because of the threat is not wait until everything is in place to attack some parts of the intelligent factory,Must therefore be deployed to detect and remedy to cope with these threats,这一点很重要.Once finalized the governance model,You can according to the selected model will solutions consistent with the expected result.
For any signs of network intrusion attempts to attack or,Defense and response plan can play a big role in the first response.The scheme can be defined attack scenarios,Can even suggested that the basic network health strategy,Can be deployed in the first place,In order to prevent the invasion of.
Here are some other steps can take,To ensure the safety of the intelligent factory.
- The threat of a thorough evaluation and vulnerabilities affect audit,To identify and fill the security holes.
- Maintenance equipment and assets list,To record all assets,Including each device patches and security status.
- 采用NIST和IEC62443标准.
- 每90-120Day a network security training.Employees should be aware of the environmental threats, and the impact of these threats commitment to the operation and production.
- 每90Days on a security audit.
- Sum of all measuring equipment series.
- In the evaluation of supply chain security threats.
- Deployed decoy and cheat solution to transfer and the study of complex attack.
- Formulate and publish security governance policies.
边栏推荐
- golang刷leetcode 经典(6) 实现跳表
- golang刷leetcode 经典(4) 实现跳表
- 魔豹联盟:佛萨奇2.0dapp系统开发模式详情
- 潮玩的“第二春”,在哪?
- 一文看懂推荐系统:概要01:推荐系统的基本概念
- mui中使用多级选择器实现省市区联动
- Google Earth Engine APP—— 一个不用写代码可以直接下载相应区域的1984-2021年的GIF遥感影像动态图
- 多聚体/壳聚糖修饰白蛋白纳米球/mPEG-HSA聚乙二醇人血清白蛋白纳米球的制备与研究
- Wechat Gymnasium Appointment Mini Program Graduation Design Finished Work (5) Task Book
- NeRF:火爆科研圈的三维重建技术大揭秘
猜你喜欢
二舅“反转”了?
在线文档Sheet技术解析
redis总结_分布式缓存
Mini Program Graduation Works WeChat Gymnasium Reservation Mini Program Graduation Design Finished Product (8) Graduation Design Thesis Template
【案例】2D变换-旋转动画
如何生成随机数+原理详细分析
vulnhub W34kn3ss: 1
Flink Learning 9: Configure the idea to develop the flink-Scala program environment
0725-面试记录
开源一夏 |【云原生】DevOps(五):集成Harbor
随机推荐
研发运营一体化(DevOps)能力成熟度模型
织梦自定义表单添加全选和全不选功能按钮
ES: Promise的基本用法
golang刷leetcode 经典(4) 实现跳表
What is the difference between erp system and wms system
golang学习之七:并发编程基础(goroutine、channel、select)
Playing in the cloud | The key technology of Tianyi cloud object storage ZOS high availability is revealed
Taking advantage of cloud-network integration, e-Surfing Cloud has paved the way for digital transformation for government and enterprises
透过案例看清API接口的作用——演示1688商品详情接口
C# 术语
魔豹联盟:佛萨奇2.0dapp系统开发模式详情
百问百答第49期:极客有约——国内可观测领域SaaS产品的发展前景
土巴兔IPO五次折戟,互联网家装未解“中介”之痛
【秒杀办法】根据二叉树的先序遍历、中序遍历、后序遍历快速创建二叉树
mui中使用多级选择器实现省市区联动
一文看懂推荐系统:概要01:推荐系统的基本概念
天翼云4.0来了!千城万池,无所不至!
Go 语言快速入门指南: 介绍及安装
55.【sort函数的升序降序】
小程序毕设作品之微信体育馆预约小程序毕业设计成品(6)开题答辩PPT