Enabling secure access to modern manufacturing networks
Article by Leon Poggioli, ANZ Regional Director at Claroty Traditional manufacturing plants and OT (Operational Technology) networks had no internet connectivity. They could run in a semi-isolated fashion, and there was little risk of a cyberattack. As the modern OT network becomes more digitised and technology-enabled to leverage AI and increased automation, they are now experiencing a much higher level of cyber risk. Traditional plants were operated very much onsite, with access controlled by strong physical mechanisms like site inductions and physical security methods permitting people to attend the site, make changes and operate the facility. The digital transformation now underway in OT networks has resulted in far more digital connectivity, with a greater focus on safety and productivity meaning more work is completed via digital methods – either by operators onsite, remote workers and 3rd party contractors, or remote machine-to-machine connectivity, with things like cloud-based AI analytics which optimise plant infrastructure. Traditional methods of access to these networks have not kept up with the digital transformation underway in OT. Password-sharing continues as a common practice, and many devices remain configured with default credentials. One recent example where this occurred was the cyberattack on Unitronics devices used by Water Authorities in the United States, which were directly exposed to the internet with default credentials configured. Some more mature organisations use a complex web of jump-boxes and VPNs to broker access to key systems in a zoned OT network, making it difficult to administer and maintain strict zero trust access to critical systems, not to mention the impact to useability as users need to log in via multiple hops to perform the work they need to perform. The digital transformation underway in cyber-physical networks demands a better approach to broker access securely to critical production systems, without compromising useability or adding unnecessary complexity. Users should […]