27.03.2024 Views

PuK - Process Technology & Components 2024

A technical trade magazine with a history of more than 60 years.

A technical trade magazine with a history of more than 60 years.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Components</strong><br />

OT security<br />

the implementation and performance<br />

requirements period.<br />

During the setting up and commissioning<br />

they take care of the<br />

network acceptance, during operation<br />

they ensure condition<br />

monitoring and predictive maintenance<br />

through appropriate<br />

service level agreements. They<br />

are also there to provide advice<br />

for plant retrofits and help with<br />

network modifications. All these<br />

tasks need three things: Knowhow,<br />

the right hardware and services<br />

suitable for the respective<br />

period in the life of the plant.<br />

Tools with integrated expertise<br />

The times in which OT networks<br />

were still islands independent<br />

from the rest of the world are<br />

largely in the past. The advantages<br />

that can result from convergent<br />

networks and direct access<br />

to the smart sensor data of<br />

the machines and plants are too<br />

great. Therefore, OT networks are<br />

increasingly internally linked to<br />

the IT level. This also then means<br />

that each component in which a<br />

CPU is installed is vulnerable. The<br />

topic of OT security is thus highly<br />

interwoven with the hardware<br />

used. The clou is that the solutions,<br />

which have proven their<br />

worth in recent years for the reliable<br />

operation of networks with<br />

the focus on predictive maintenance,<br />

are also suitable for monitoring<br />

network security. The system<br />

is therefore now referred to<br />

as a CM&SM (Fig. 2), a condition<br />

monitoring & security management<br />

system.<br />

To ensure OT security, IEC<br />

62443-3-3 sets various requirements,<br />

which ultimately provide<br />

the condition for the principle<br />

of “Defence in Depth” (Fig. 3).<br />

The requirements relate to identification<br />

or authentication, use<br />

control, system integrity, confidentiality<br />

of the data, prompt response<br />

to events and the availability<br />

of the resources. Each of<br />

these seven requirements needs<br />

different tools or measures to<br />

implement them. The various<br />

solutions of Indu-Sol can help in<br />

completely different areas. Here<br />

are a few examples: An initial topology<br />

scan for the identification<br />

or authentication of OT networks<br />

and a periodic scan, for example,<br />

can be implemented and managed<br />

with our condition monitoring<br />

& security management<br />

system. The tools of the network<br />

experts check the data commu-<br />

Fig. 4: OT cyber security and digitalisation in accordance with ISA/IEC 62443,<br />

Part 3-3 (copyright holder: Indu-Sol)<br />

nication for unwanted changes,<br />

use encryption methods for secure<br />

data transmission, segment<br />

individual network areas for security<br />

reasons, ensure continuous<br />

data monitoring and auto-<br />

Fig. 3: Excursus: ISA/IEC 62443 – The layers of defence in depth from the view of OT<br />

(copyright holder: Indu-Sol)<br />

service providers with the appropriate<br />

know-how. Indu-Sol contributes<br />

this know-how on an<br />

equal footing within the scope of<br />

an OT competence partnership.<br />

The good news is that it is not<br />

necessary to reinvent the wheel,<br />

but instead, tried and tested solutions<br />

are on hand to face these<br />

new requirements confidently.<br />

Fig. 2: Condition monitoring and security management system (CM&SM) for plants<br />

and OT networks with Profinet and Ethernet/IP (Copyright holder: Indu-Sol)<br />

mated alerting or help with the<br />

backup and restoring of device<br />

configurations.<br />

The list of requirements<br />

and how they can be met with<br />

the system is long. One trend is<br />

clear: With the requirements of<br />

IEC 62443 and also the new Machinery<br />

Regulation that will soon<br />

come into effect, in future greater<br />

focus will be placed on the OT<br />

security of industrial communication<br />

networks (Fig. 4). This requires<br />

solutions in the form of<br />

components, supporting systems<br />

as well as skilled employees or<br />

The Authors:<br />

Denise Fritzsche,<br />

Marketing at Indu-Sol and<br />

Dipl.-Ing. (FH) Nora Crocoll,<br />

Redaktionsbüro Stutensee<br />

Indu-Sol GmbH, Schmoelln<br />

www.indu-sol.com<br />

PROCESS TECHNOLOGY & COMPONENTS <strong>2024</strong><br />

105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!