MONTH 2023

Share This
Manufacturing Software

Labor shortages are driving new demand for automation.

Options for Screwfeeding

To protect people, data, and production machinery, manufacturers need a comprehensive cybersecurity strategy. Photo courtesy ELATEC Inc.

Strong security practices are needed to protect IP, prevent production delays, and ensure safety.

Machine Authentication:

Endpoint Security in the Smart Factory

Mike Harris // Head of Business Development // ELATEC Inc. // Palm City, FL

Smart, connected production machinery has transformed manufacturing, leading to tremendous productivity, safety and quality gains. However, the Industrial Internet of Things (IIoT) has also created new security risks. Connected machines represent a cybersecurity endpoint in the smart factory that can put facilities and data at risk. Strong endpoint security practices—including machine user authentication—are needed to protect valuable intellectual property (IP), prevent production delays, and ensure the safety of people and facilities.

Cyberattacks on manufacturers are rising, with an average cost of $4.47 million per incident in 2022. Many of these are traditional attacks on IT infrastructure, such as phishing attacks, ransomware and malware attacks on websites or networks. However, as manufacturers ramp up their use of IIoT and operational technology (OT) devices, production machinery has become a tempting target for hackers and bad actors. Attacks on production machinery or safety-instrumented systems (SIS) can cause considerable operational disruption.

IIoT and OT devices are cyber-physical systems that act as endpoint devices for the factory network. In addition to risks presented by unauthorized access to machine controls and software, they also increase the attack surface for the factory as a whole, allowing bad actors to use them as a pivot point into other IT systems. Unprotected IIoT devices leave factories vulnerable to data breaches, malware and ransomware attacks, denial of service attacks, and other potential harms.

Cyberattacks on production machinery can cause severe damage, including:

Unexpected production shutdowns due to malicious capture of machinery controls.

Loss or theft of valuable company or client IP stored on or transmitted to connected machines.

Safety or quality issues arising from unauthorized changes to machinery controls and settings.

In many factories, production machines are among the most vulnerable network endpoints. This is partly because IT and OT tend to exist in silos, with IT handling traditional endpoint devices (laptops, printers, servers, etc.), while the operations department handles machinery on the factory floor. The 2019 Deloitte and MAPI Smart Factory Study suggests that IT and OT are seriously misaligned in many factories, leading to significant vulnerabilities on the factory floor. Other factors that increase cyber risk include:

Weak authentication methods that are easily compromised by hackers or inside actors.

Poor physical security on the factory floor.

Lack of proper encryption to protect stored data or data in transit.

Lack of security updates or outdated operating systems and software.

Legacy equipment that lacks modern security features.

Minimal endpoint and network security features, such as firewalls, intrusion or anomaly detection, and antivirus software.

Material property, Font

Best Practices in OT and IIoT Cybersecurity

To protect people, data, and production machinery, manufacturers need a comprehensive cybersecurity strategy. This requires adopting best practices and complying with industry standards and regulations.

One of the most essential things manufacturers can do is break down the silos between OT and IT. When considering production machinery as a network endpoint, it becomes clear that OT and IIoT devices must have the same level of attention and protection as laptops, servers and other IT devices. That means adopting best practices from the IT side. These measures include:

Ensure timely firmware and security updates for all production machinery.

Implement network segmentation and isolation to prevent users or hackers from using machines to pivot into the network.

Use appropriate encryption to protect production data both at rest (in the machine memory) and in transit (during communication between the machine and other networks or systems, including cloud applications).

Adopt a zero-trust security model for networked devices, which continuously verifies device trustworthiness rather than assuming devices are trustworthy once verified initially.

Utilize intrusion detection, intrusion prevention and anomaly detection software to detect unusual network traffic to or from the machine and monitor machine health and behavior.

Inspection System

Product, Gesture, Font, World

With RFID, the same access control technology can be used for physical access control, machine authentication, and digital access to systems and networks. Photo courtesy ELATEC Inc.

Protect Production Machinery With Strong User Authentication

Machine authentication is a cornerstone of endpoint security in the smart factory. Strong authentication technology ensures that only authorized, trained operators can access controls for production machinery and allows companies to track exactly who has accessed each machine and at what times. The right machine authentication solution can also reduce the risk of remote hacking.

Many manufacturers still rely on password or PIN systems for machine access. However, passwords and PINs are often shared or forgotten. They can also be hacked.

Radio-frequency identification (RFID) offers a more secure alternative to a password or PIN for machine authentication. Users present a physical badge or token to unlock access to the machine. This can also be accomplished via a mobile credential on a smartphone using near-field communication (NFC) or Bluetooth low energy (BLE).

An RFID or mobile solution for machine authentication increases machine security in several ways. First, these systems are highly secure and difficult to clone or hack when appropriate encryption is used. Physical badges, tokens or phones are also less likely to be shared than a password or PIN. In addition, the user must be physically present at the machine with the badge, token or device in hand to unlock access, reducing the risk that the machine can be inappropriately accessed via remote hacking or password theft.

For higher security, RFID and mobile access solutions can be implemented as part of a multifactor authentication process using a secondary password or biometric system.

Finally, loss or theft of a physical badge, token or device is likely to be noticed immediately, unlike a compromised password. IT can quickly and easily shut off authorization if a card is lost or stolen or an employee leaves the company.

Communication Device, Gesture, Font, Finger, Gadget

Physical badges are also less likely to be shared than a password or PIN. In addition, the user must be physically present at the machine with the badge in hand to unlock access. Photo courtesy ELATEC Inc.

Consider Physical Access as an Aspect of Endpoint Security

Endpoint security must be considered in the context of the total security concept, including physical security. Physical access control (PAC) enhances endpoint security by limiting who can enter the production floor or have physical access to production lines and machines.

This is important because many industrial espionage cases are inside jobs. Limiting physical access to production areas and machinery prevents bad actors from tampering with or disabling access hardware (such as RFID readers), plugging unauthorized devices into a machine (such as a USB drive carrying a virus), or damaging the machine. The PAC solution should go beyond the front door to enable monitoring of employee movements through production areas. In the case of a security or cybersecurity incident arising from the inside, it can be crucial to know precisely who has been in each production area and accessed each machine and at what times.

Ensure Compliance With Cybersecurity Standards and Regulations

Manufacturers must ensure that cybersecurity systems and protocols comply with industry best practices and relevant regulations. The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides guidelines for improving cybersecurity risk management across all industries, including manufacturing. It offers a framework for identifying, protecting, detecting, responding to, and recovering from cybersecurity threats. NIST has also developed a set of cybersecurity resources for manufacturers. In addition, the system should comply with relevant ISO standards such as:

* SA/IEC 62443: A widely recognized industrial automation and control systems (IACS) cybersecurity standard. It provides a structured approach to securing industrial control systems and is especially relevant to manufacturing.

* ISO 27001: A globally recognized standard for information security management systems (ISMS) that manufacturers widely use to establish and maintain comprehensive information security controls.

Manufacturers in highly regulated industries like energy or defense may have additional cybersecurity and machine access control regulatory requirements.

Clothing

Strong authentication technology allows companies to track exactly who has accessed each machine and at what times. Photo courtesy ELATEC Inc.

Setting Up a Secure Machine Authentication Solution

Strong machine authentication technology is an integral part of endpoint security for manufacturing. For optimal performance, consider the following points:

Use the right access control technology. RFID or mobile credentials using BLE or NFC are more secure, reliable and convenient than password or PIN systems for machine authentication. An RFID badge or token is usually the preferred choice in a factory environment. Smartphones may be a safety or security risk on the factory floor and can be damaged in dusty, hot or humid factory environments. Since most manufacturers issue a corporate ID card for building access and security, it makes sense to leverage the same card for machine access.

Choose transponder technologies and encryption suitable for the application. Communication between the RFID tag and the reader should be encrypted to prevent eavesdropping and credential cloning. In general, high-frequency (HF) RFID technologies, which operate at 13.56 megahertz, allow for more advanced encryption and longer encryption keys than low-frequency (LF) RFID technologies, which operate in the 125 kilohertz range. Well-known transponder technologies such as MIFARE, LEGIC and HID Prox or iClass offer a range of security features and encryption options. For machine authentication, look for a reader that supports at least 128-bit encryption, such as AES-128. Some readers now support advanced elliptic curve cryptography (ECC) for an even higher level of security.

NFC is usually preferred over BLE for facilities supporting smartphone authentication use. NFC credentialing mimics an HF RFID signal on the same 13.56 MHz band. Compared to BLE, NFC has a much shorter read range (a few centimeters vs. up to 100 meters), which ensures users are in close proximity to the machine or device they are unlocking. The short read range prevents others from piggybacking on the proximity of users who are in the vicinity but not actively using the machine. It also reduces signal eavesdropping risks. NFC supports strong encryption, just like HF RFID. A universal reader, such as those available from ELATEC, enables manufacturers to support smartphone credentialing, LF or HF RFID, and even newer interoperable and open standard credentials, such as LEAF or those based on public key infrastructure (PKI), providing maximum flexibility.

For even higher security, consider adding two-factor authentication. This can be accomplished, for example, by requiring both a password and an RFID token to log into the machine. Smartphone credentialing allows for an additional layer of security through the device itself; biometrics (facial or fingerprint recognition) can be turned on for the phone, ensuring that only the phone owner can open the credentialing app.

Portable communications device, Mobile phone, Product, Gadget, Gesture

NFC is usually preferred over BLE for facilities supporting smartphone authentication use. Photo courtesy ELATEC Inc.

Differentiate access levels by user. The access technology should differentiate access levels by user or role. Make sure the system allows a unique identification for each user so that it is possible to identify precisely who is operating each machine and when. Then, consider the type and level of access appropriate for their role and responsibilities.

Having different access levels for different roles, such as machine operators, line supervisors, process engineers, IT and maintenance, is usually desirable. For example, line operators may only need basic access to a few machine functions to carry out production activities, while supervisors and IT may need to be able to access advanced machine parameters and configurations. For maximum security, users should only have the minimum access required to perform their jobs.

Integrate physical and cybersecurity. With RFID, the same access control technology can be used for physical access control (including building entry and “beyond the door” locations), machine authentication, and digital access to systems and networks. A unified access system simplifies security for both IT and OT. It’s also easier for employees since the same credential can be used for everything they need to access at work.

An integrated system enhances endpoint security by limiting both physical access to machines and access to machine controls. This protects the machine from physical tampering and sabotage as well as unauthorized access to the human-machine interface (HMI).

Physical security also includes the integration of the reader into the production machinery. A reader fully integrated into the machine or HMI is more tamper-resistant than one simply plugged into the machine with a USB cord, for example.

January 2024 | Vol. 67, No. 1

Material property, Rectangle, Font
Rectangle, Font