Download - Securing the Manufacturing Digital Thread
![Page 1: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/1.jpg)
Securing the Manufacturing Digital Thread
Frank Backes President - CTRAC
Center for Technology, Research and Commercialization
![Page 2: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/2.jpg)
Why Security
Business Stability & Profitability Improving Safety, Reliability and Availability Customer/Market Imposed Requirements Regulatory Requirements Corporate Image and Reputation Legal Liabilities
![Page 3: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/3.jpg)
Potential Consequences Physical – Economic – Social
National Security
Loss of Production
Injury
Damage to Equipment
Environmental Damage
Product Contamination
Loss of Intellectual Property
Impacted Reputation
![Page 4: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/4.jpg)
WHO
Information Technology
Operations Technology
Build and Train a Cross-Functional Team
CSO Control Engineers
Control Systems Operators Subject Mater Experts
CIO Network Engineers IT Administrators
IT Support
![Page 5: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/5.jpg)
![Page 6: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/6.jpg)
TRADITION
Step 1 – Assess Existing Systems Step 2 – Document Policies & Procedures Step 3 – Train Personnel & Contractors Step 4 – Segment the Control System Network Step 5 – Control Access to the System Step 6 – Harden the Components of the System Step 7 – Monitor & Maintain System Security
EFFECTIVE • PREDICTABLE • COMPLEX • SLOW • EXPENSIVE • HARD TO GET STARTED
![Page 7: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/7.jpg)
AGILE SECURITY
ASSESS PRIORITIZE EXECUTE ITTERATE
START NOW – ONE PROJECT – INCREMENTAL IMPROVEMENT
![Page 8: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/8.jpg)
FIRST PROJECT NETWORK SEGREGATION
CONTROL NETWORK
COPORATE NETWORK
Users
Control Server
DMZ
HMI
Data Historian
Data Server
Cross Domain Guard Protocol B
Protocol A
![Page 9: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/9.jpg)
NIST Recommendation
![Page 10: Securing the Manufacturing Digital Thread](https://reader031.vdocuments.net/reader031/viewer/2022030223/5882bde91a28abb2478b54eb/html5/thumbnails/10.jpg)
QUESTIONS?