Securing IoT environments: A key pillar of Industry 4.0

By : Itzik Feiglevitch, IoT Product Manager | Monday, May 31 2021 - 15:30 IWST

IOT Security
IOT Security - Check Point Software Technologies Business and factory closures, staff being made redundant or furloughed, disrupted working patterns:  the pandemic has had a huge impact across the industrial and manufacturing sectors, and their supply chains.

The shockwaves of this impact on both supply and demand of manufactured goods are still being felt: for example, automotive manufacturing output is still reduced as a result of global computer chip shortages.  

However, advances in industrial and manufacturing technology have helped to overcome some of the physical-distancing obstacles imposed by the pandemic – such as the widespread adoption of IoT devices, which enables remote monitoring and control of key assets in critical infrastructure, industrial control systems (ICS) and manufacturing systems. These advances – referred to as ‘Industry 4.0.’ support new levels of machine-to-machine communications to help automate and streamline processes.  

But as networks have expanded hugely, with tens of thousands of new, intelligent devices being added, the IoT devices themselves and the extended connectivity that supports them opens up a range of new security vulnerabilities and risks. Hackers are only too willing to exploit those vulnerabilities.

IBM's 2021 X-Force Threat Intelligence Index found that cyberattacks on manufacturing, energy and healthcare sectors doubled in 2020 compared to 2019.  

Every time a smart device is added to the network, its attack surface expands. This is because connected devices are often inherently vulnerable and easy to attack. This explains why 67% of U.S. enterprises have already experienced a security incident related to IoT devices. And with an estimated 18 billion IoT devices in use by the end of 2022, it’s critical that organisations implement security measures to prevent and block these attacks before they get out of control. 
IoT devices are weak links 

So why are IoT devices often vulnerable to attack? Simply because in many cases, they were not designed or made with security in mind. They frequently run on legacy or proprietary software that was not designed with built-in security. They have weak default or hardcoded passwords that are easy to bypass. They lack sufficient user, data and system authentication capabilities.

Their software cannot be updated or patched frequently, due to access limitations, concerns over downtime or the need to re-certify systems. 

In the case of IoT devices and operational technology (OT) systems used in critical infrastructure or manufacturing, they often use outdated operating systems such as Windows XP or Windows 7. Hackers know these operating systems are an Achilles’ heel because they are no longer supported, and it is extremely difficult and costly to update mission-critical devices that run on them.

This has made these devices a prime target for tailored APT attacks, malware, phishing and ransomware attacks that usually start on the IT network, because they’re a weak link in the security chain. IoT devices and OT systems are an especially enticing target for attackers who use ransomware because they know that businesses would rather pay the ransom than face having the machine offline — or worse, taken down completely. 

You can’t secure what you can’t see

While IoT and OT environments in organisations are growing increasingly complex, traditional IT security solutions have fallen far behind. One of the biggest challenges is knowing exactly what devices an organisation has connected to its networks. Research has shown that 61% of IT teams have no, or low confidence in knowing exactly which devices are connected to their network.

If they don’t even know what’s on their network, IT teams cannot be expected to know what those devices do, or what they are connected to – let alone if they have flaws that could be exploited, or what type of protection they need. In short, IT and security teams are working in the dark.

So the starting point for protecting complex Industry 4.0 networks is for teams to get complete visibility of the risks their networks are exposed to. They need an easy way to determine what devices they have and determine their vulnerabilities and risk.  

Then, they need to be able to monitor the IoT and OT protocols and commands, so they can determine if the systems are connecting and communicating properly. With this knowledge, teams can then create security policies designed for IoT and OT systems that can prevent security breaches and keep up with the latest threats.

All this has to be done without impacting security operations.  Security must be easy for organisations to deploy with automated protection that does not impact day-to-day operations.

Securing everything

With these points in mind, organisations need a security approach which can not only identify any IoT device in any environment on the network, but also assess its risk status and deliver the appropriate security needed to protect both the device and the network it communicates with.  

Their security solution should deliver these functions:

IoT discovery and risk analysis: The solution should be able to discover all IoT assets and determine their security risks and vulnerabilities. It should also give a single-console view of all assets, classified based on their risk level with the ability to drill down for a risk analysis per asset.  

Recommend Zero Trust segmentation security policies: Based on visibility of all assets and risks, the solution should suggest Zero Trust security policies customised per device to instantly minimise risk exposure. This can save months of manual policy configurations and ensures IoT assets are secured immediately when they connect to the network. It also blocking of unauthorised access to and from IoT devices.

Threat prevention to protection against the latest threats: As we pointed earlier, many IoT devices have inherent vulnerabilities that cannot be patched or updated. The solution should enable to you protect all devices against known and unknown zero-day attacks through virtual patching.

In conclusion, as the number of IoT devices in industrial and enterprise environments continues to grow, so does the importance of implementing security solutions, practices, and controls that can identify and protect these devices. Inadequate security controls on these devices and the networks they connect to leave organisations at significant risk of data breaches, operational disruption, and revenue loss.

With advanced solutions that offer the capabilities outlined above, organisations will be fully prepared to secure their IoT estates, and protect their Industry 4.0 deployments.

News Comment

Today's Industry

President Jokowi inspects vaccination for students at State Vocational High School SMKN 1 Beringin, Deli Serdang regency, Thursday (16/9). (Photo by: Presidential Secretariat/Laily Rachev)

Senin, 20 September 2021 - 13:05 WIB

President Jokowi Lauds Students’ Enthusiasm for In-Person Learning

President Joko “Jokowi” Widodo inspected COVID-19 vaccination for students at Vocational High School SMKN 1 Beringin, Deli Serdang regency, North Sumatra, Thursday (16/9).

Vice President Ma’ruf Amin (Photo: BPMI)

Senin, 20 September 2021 - 12:15 WIB

VP Calls for Public Collaboration to Combat Drugs Abuse

Vice President Ma’ruf Amin has urged the nation to join hands and participate in a joint effort to eradicate drug abuse.

President Jokowi on his inspection of door-to-door vaccination at Panampaan village, Harjamukti district, Cirebon city, Tuesday (31/08). (Photo by: BPMI/Muchlis Jr)

Senin, 20 September 2021 - 11:08 WIB

President Jokowi in Aceh to Inspect Door-to-Door COVID-19 Vaccination

President Joko “Jokowi” Widodo started his working visit in the provinces of Aceh and North Sumatra by inspecting the door-to-door COVID-19 mass-vaccination in Aceh Besar regency.

Hypertherm, a U.S. based manufacturer of industrial cutting systems and software.

Rabu, 15 September 2021 - 20:15 WIB

Hypertherm Introduces Three New Plasma Systems With Built-in Intelligence and a Revolutionary Single-Piece Cartridge Consumable

Hypertherm, a U.S. based manufacturer of industrial cutting systems and software, today announced three new air plasma systems called Powermax SYNC™. Featuring built-in intelligence and a…

The Pacific Asia Travel Association (PATA)

Rabu, 15 September 2021 - 19:44 WIB

PATA launches Virtual PATA Wellness and Luxury Travel Conference and Mart 2021 in October

The Pacific Asia Travel Association (PATA) is pleased to announce the launch of the Virtual PATA Wellness and Luxury Travel Conference and Mart 2021, taking place from October 20-22.