Cyber-security guidelines for automation networks
ODVA's guidelines document, Securing Ethernet/IP Networks, outlines plans and strategies for cyber-security in automation networks. See four ways to mitigate risk.
Manufacturers are increasing connectivity between plant floor and enterprise systems to boost productivity and reduce time to market, but interconnectivity can also bring undesirable security risks. ODVA announced the availability of a new guidelines document, Securing EtherNet/IP Networks, which discusses cyber-security recommendations for automation networks, including how to determine and deploy security strategies for various network types. (See four ways to mitigate risk, below.)
“In the past, manufacturers were able to secure industrial control systems simply by controlling physical access to their automation components,” said Katherine Voss, executive director, ODVA. “Today’s demand for increased productivity requires interconnectivity through industrial Ethernet – most often EtherNet/IP, as it provides unprecedented visibility into real-time machine and supervisory systems. As many businesses are concerned about the security risks that come from a free flow of information, ODVA outlines how to manage risks with the implementation of processes and technology.”
The document's aim is to provide users with a starting point for thinking about what cyber-security means for industrial networks, what a security strategy looks like and direct readers to additional resources and information.
In the guidelines, ODVA outlines key security concerns in industrial automation, and provide guidance and resources. Four ways to change processes to mitigate risk include:
- Risk analysis
- Collaboration between IT and industrial departments
- Best practices for different types of industrial networks
- Emerging industrial security technologies
- Edited by Chris Vavra, Control Engineering, www.controleng.com
Safety and security channel
Machine Safety Blog
Industrial network channel
Case Study Database
Get more exposure for your case study by uploading it to the Consulting-Specifying Engineer case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.