Accelerating your Zero Trust journey in manufacturing

Issue 7 2022 Infrastructure, Information Security, Industrial (Industry), IoT & Automation


Francois van Hirtum.

Many manufacturing operations are still struggling with ageing IT/OT infrastructure that can be difficult to secure, as well as a poorly integrated set of security point products that does not align with the strategic approach expected by their executive management.

Digital transformation is accelerating within the manufacturing space with the continued modernisation and interconnectedness of the environment, the development of the hybrid workforce, and increased pressure to maintain availability in light of more sophisticated cyber threats. Industry in general can be said to have reached a tipping point, with many users and apps now residing outside of the traditional perimeter.

Given this combination of tremendous change coupled with the need for availability and operational resilience, information security teams working within manufacturing require a modern approach to security that fits these significant shifts.

The new reality

A hybrid workforce is the new reality; businesses must provide access from anywhere and deliver an optimal user experience. The days of managing implied trust by relying on a static, on-premise workforce are gone. At the same time, application delivery has tilted firmly in favour of the cloud, public or private, and has enabled development teams to deliver at an unprecedented pace.

However, new architectures, delivery and consumption models create more instances of implied trust, and an expanding catalogue of apps creates a broader attack surface, while implied trust granted to microservices yields new opportunities for attackers to move laterally. Moreover, infrastructure can be anywhere, and everything is increasingly interconnected, making the elimination of implicit trust even more critical. You can no longer simply trust IT equipment such as printers or vendor-supplied hardware and software, because IT and workplace infrastructure are increasingly connected to Internet-facing apps that command and orchestrate them centrally.

How do you define risk?

The important thing to understand is that anything Internet-facing is a risk to your organisation. Physical locations are increasingly run by connected things, including IoT devices, which typically have more access than they need. Traditional IT patching and maintenance strategies do not apply here – cyber adversaries know this is ripe for exploitation.

The biggest challenge to adopting a Zero Trust architecture has not been a lack of specific security tools, but a simple lack of resources (talent, budget, interoperability, time, etc.). Running the most current security controls against a moving target – a dynamic threat landscape – has historically been challenging for the manufacturing industry.

A comprehensive Zero Trust approach can be implemented for businesses operating in the sector, but it must be augmented by the right set of security capabilities that enable consistent controls across IT and OT environments.

Instead of testing, running and fixing multiple non-integrated security controls across all of your security domains, such as malware or DLP (for protecting your intellectual property or trade secrets), you can rely on one single control which you can deploy across your organisation.

Security by design becomes a reality as deployment, operations and time-to-market costs are decreased. Moreover, leveraging the network effect of telemetry from the entire organisation, and not just from one specific area, means the time to respond to and prevent cyber threats is lowered, leading to more resilient cybersecurity.

To summarise, Zero Trust is a strategic approach to cybersecurity that secures an organisation by eliminating implicit trust and continuously validating every stage of digital interaction. It is a modern, holistic approach to security that enables manufacturing operations to meet current challenges in a proactive manner for higher levels of security, reduced complexity, and increased functional resilience that minimises downtime and disruption to operations.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
The Duxbury Services Gateway revolutionises the Edge
Products & Solutions Infrastructure
Duxbury Networking has announced the launch of the Duxbury Services Gateway (DSG) range. These cost-effective edge compute appliances are designed to meet the diverse needs of South African businesses including SD-WAN, Firewall, and IP PBX applications.

Read more...
AI in check
AI & Data Analytics IoT & Automation
While AI has many applications and benefits, and businesses are exploring its use in various ways, there is also a level of risk involved, particularly when it comes to the data that AI uses.

Read more...