In addition, Logix Source Protection, a feature in Rockwell Software® Studio 5000™ Logix Designer application from Rockwell Automation, enables OEMs to assign a password to any routine or add-on instruction to help protect the valuable intellectual property contained within the applications.
Secure Remote Access
With the correct security procedures and architectural systems in place, remote monitoring through open-standard networks can provide OEMs and end users with an unprecedented ability to remotely oversee operations, perform real-time diagnostics and keep maintenance costs low.
Many end users are further reducing their costs with cloud-based computing that enables manufacturing operations on virtually any scale to deploy 24/7 monitoring of valuable applications. Moving remote access and support to the cloud, through a secure EtherNet/IP™ connection, helps OEMs monitor performance and quickly send critical data to the appropriate person.
The increasing sophistication of remote-systems monitoring, asset management and engineering support demonstrates how cloud technology facilitates IP-enabled “intelligent enterprise” advances in plant-floor security, connectivity, performance and ease of integration. A mission-critical production asset like a medium-voltage drive illustrates the point.
A nonfunctioning, isolated drive can result in a significant loss of revenue. With cloud technology, when this drive issues a warning or fault, the information is easily propagated to create a work ticket for a support engineer. Within minutes, a cloud-based, asset-monitoring application has an expert looking at the fault and taking corrective actions.
OEMs can add an additional layer of security in remote monitoring with secure routers. For example, the Allen-Bradley® Stratix 5900™ services router from Rockwell Automation enables users to help protect their information by creating encrypted tunnels which limit access to the traffic to authorized users, all while using the existing untrusted network.
By making ongoing investments in secure integration, property protection and remote access, OEMs can reduce exposure to unnecessary risks as they capitalize on the opportunities presented by the connected enterprise.
----------------------------------------------
10 Steps to Building Security Into Machinery
OEMs can enhance their industrial reliability and security with these 10 actionable steps.
- Control who has network access using tools, such as access control lists and port-blocking features/devices.
- Ensure robust and reliable operations by employing firewalls and intrusion detection/prevention.
- Use anti-virus protection and whitelisting.
- Establish a system-patching policy to keep software up-to-date.
- Develop procedures for employee-security practices, for example: managing and protecting passwords, managing removable media and use of personal devices.
- Physically block changes to your controller by putting it in Run Mode.
- Control who is allowed to do what from where in the application with FactoryTalk Security architecture.
- Monitor what is going on in your system with Controller Change Detection and FactoryTalk AssetCentre system.
- Protect your intellectual property with Logix Source Protection.
- Ensure all Ethernet devices are connected using standard Internet Protocol.