According to the cyber threat report by SonicWall, there were 34.3 million attacks by IoT malware in 2019 worldwide, a rise of 5 percent compared to the previous year. For manufacturing companies, this means a need to introduce new security strategies for their networked machinery. Failure to adapt presents a risk that hackers will attack production processes, and/or steal business-critical data.
Attackers can steal sensitive intellectual property, switch off the power to a system, or block functions that the company can only monitor again once a ransom is paid. For example, the computer worm NotPetya stopped production lines at Renault in France, blocked the shipping company Maersk from being able to load containers, and caused sensors to fail at the reactor turbines in Chernobyl.
Connecting industrial networks to general or public IT networks therefore carries risks that did not exist in previously isolated networks of the past. The threat of an intrusion into industrial networks via remote access is currently listed by Germany's Federal Office for Information Security (BSI) in fourth place among the Top 10 threats. The secure implementation of remote maintenance access and the monitoring of access are therefore of high priority if companies want to secure their internal networks and monitoring systems.
Networked machines and factories are a worthwhile target for cybercriminals. The IT business association Bitkom estimates the economic damages to the German industry caused by hackers at 102.9 billion euros in 2019, and attributes the damages to, among other things, the increasing number of IT systems placed in the operational technology (OT) environment. In an industrial environment an attack, or an inadvertent infection of the IT controls of a system, a networked car, or traffic management can not only affect data, but in extreme cases it can also be life-threatening. The problem many companies face in the course of this development: an insufficient overview of the IT systems, applications, and data processed in their production environment.
The experts at T-Systems Security ensure the safeguarding of production environments, making OT secure. They reinforce systems and protect them from ransomware, industrial sabotage, and other cyberattacks. They support production managers and OT managers in the search for previously unknown, dynamic, and mobile devices while ensuring constant availability of applications and devices. T-Systems Security offers companies two different options for consulting services: OT Security Check pursuant to ISO 27001 and OT Security Check pursuant to ISA/IEC 62443 as well as weak-point analysis and penetration tests.
ITTP detects anomalies in an industrial system's behavior by learning standard commands and regular behavior that complies with the rules within this system. ITPP then detects deviations from the norm. If the solution registers a weak point in the system, it provides information in real time and shows detailed information in a clear console terminal. Experts are then able to assess the transaction and introduce countermeasures as appropriate.
INPP is a firewall for industrial networks. Its primary focus is to prevent unauthorized attacks on the network as well as uncontrolled data flows. A network can be subdivided into secured zones so that INPP data flows between the zones can be monitored and checked. This prevents unauthorized attacks on control systems. INPP can implement centrally managed security guidelines across locations and manufacturers. Security gateways can also be used as sensors for the detection of attacks and access protection for remote maintenance.
IAAP guards against remote access to machines used for remote maintenance, for example. The service company technicians gain access via an encrypted connection using a "rendezvous server". 2-factor authentication is used as an additional security measure. The customer's employee likewise sets up a connection to the rendezvous server. They authorize the technician's connection via a service box or the management portal for a defined period of time. Work on the systems can be monitored and recorded live.
Future-proofing a company requires four building blocks: connectivity, cloud and infrastructure, security, and digitalization. Industry 4.0 and smart factories require special protection against attacks.