Accelerating your Zero Trust journey in manufacturing

Issue 7 2022 Infrastructure, Information Security, Industrial (Industry), IoT & Automation


Francois van Hirtum.

Many manufacturing operations are still struggling with ageing IT/OT infrastructure that can be difficult to secure, as well as a poorly integrated set of security point products that does not align with the strategic approach expected by their executive management.

Digital transformation is accelerating within the manufacturing space with the continued modernisation and interconnectedness of the environment, the development of the hybrid workforce, and increased pressure to maintain availability in light of more sophisticated cyber threats. Industry in general can be said to have reached a tipping point, with many users and apps now residing outside of the traditional perimeter.

Given this combination of tremendous change coupled with the need for availability and operational resilience, information security teams working within manufacturing require a modern approach to security that fits these significant shifts.

The new reality

A hybrid workforce is the new reality; businesses must provide access from anywhere and deliver an optimal user experience. The days of managing implied trust by relying on a static, on-premise workforce are gone. At the same time, application delivery has tilted firmly in favour of the cloud, public or private, and has enabled development teams to deliver at an unprecedented pace.

However, new architectures, delivery and consumption models create more instances of implied trust, and an expanding catalogue of apps creates a broader attack surface, while implied trust granted to microservices yields new opportunities for attackers to move laterally. Moreover, infrastructure can be anywhere, and everything is increasingly interconnected, making the elimination of implicit trust even more critical. You can no longer simply trust IT equipment such as printers or vendor-supplied hardware and software, because IT and workplace infrastructure are increasingly connected to Internet-facing apps that command and orchestrate them centrally.

How do you define risk?

The important thing to understand is that anything Internet-facing is a risk to your organisation. Physical locations are increasingly run by connected things, including IoT devices, which typically have more access than they need. Traditional IT patching and maintenance strategies do not apply here – cyber adversaries know this is ripe for exploitation.

The biggest challenge to adopting a Zero Trust architecture has not been a lack of specific security tools, but a simple lack of resources (talent, budget, interoperability, time, etc.). Running the most current security controls against a moving target – a dynamic threat landscape – has historically been challenging for the manufacturing industry.

A comprehensive Zero Trust approach can be implemented for businesses operating in the sector, but it must be augmented by the right set of security capabilities that enable consistent controls across IT and OT environments.

Instead of testing, running and fixing multiple non-integrated security controls across all of your security domains, such as malware or DLP (for protecting your intellectual property or trade secrets), you can rely on one single control which you can deploy across your organisation.

Security by design becomes a reality as deployment, operations and time-to-market costs are decreased. Moreover, leveraging the network effect of telemetry from the entire organisation, and not just from one specific area, means the time to respond to and prevent cyber threats is lowered, leading to more resilient cybersecurity.

To summarise, Zero Trust is a strategic approach to cybersecurity that secures an organisation by eliminating implicit trust and continuously validating every stage of digital interaction. It is a modern, holistic approach to security that enables manufacturing operations to meet current challenges in a proactive manner for higher levels of security, reduced complexity, and increased functional resilience that minimises downtime and disruption to operations.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
On-camera AI and storage create added benefits
Elvey Security Technologies AI & Data Analytics Surveillance IoT & Automation
The days of standalone security systems are long past, and the drive is now to educate system integrators, installers, and end users on the return on investment that can be derived from intelligent, integrated BMS, IoT and security systems.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...