尽管多年来一直严肃地讨论了制造和流程行业中的网络安全概念,但当您考虑广泛的行业应用时,仍在缓慢地实施。但是有些迹象表明,2013年可能是这种情况发生变化的一年。
仅在过去的一周中,我就进行了讨论或看到新闻解决了我以前从未见过太多讨论的工业安全的三个关键方面。需要明确的是,多年来,我所看到的很多东西倾向于集中于基于软件的网络安全的应用,例如防火墙,白色上市和身份验证以及涉及政策和程序的流程导向步骤。我在这篇文章中所指的三个不太讨论的概念涉及嵌入式安全性,补丁管理以及主要安全小组参与网络安全计划。
On the embedded security front, I was given a preview of a new product soon to be released by Icon Labs that can be used to retrofit security onto existing assets. In essence, any device in your operation—from sensors and drives to controllers and actuators—that is or can be connected to a network can now have embedded-level firewall protection. According to图标实验室,其闸门防御者设备是一种小型占地防火墙设备,可用于现有工业系统的倒入安全性,可用作独立设备或与McAfee Epolicy Esporestrator(EPO)集成。当然,作为改装的闸门防御者实际上不是嵌入式安全设备,因为您无法打开现有资产并将闸门防御者集成到该设备的主板上。但是,通过在设备级别提供防火墙保护,闸门防御者旨在将企业级别的深度防御概念从企业级别带到设备级别。请继续关注此产品,当产品发布时,我将有更多信息可以分享。
另一个网络安全带到我的attentio移动n this week comes fromGE’s Measurement & Control business, which introduced its CAP Software Update and SecurityST Appliance. The SecurityST Appliance is said to provide centralized account management, event logging and management, network intrusion detection and update and backup change management. And while these issues are certainly important, it was the CAP Software Update release that piqued my interest because of its focus on patch management—a critical cyber security issue that all-too-often doesn’t get the attention it deserves once the core cyber security software is installed. Designed “to keep pace with constantly evolving cyber threats,” GE says its new CAP Software Update will help asset owners more effectively manage their current digital patch levels and anti-virus/host intrusion detection signatures. Patch management is one of those boring-but-important cyber security issues that no one should overlook. Without it, holes in your otherwise well-planned cyber security plan start to appear within days, if not hours.
My last cyber security point, for now, comes from renowned cyber security expert Eric Byres, CTO and co-founder ofTofino Industrial Security. In his latest blog post Eric offered his cyber security predictions for 2013. Though I found all his prognostications to be of interest, it was his prediction around the involvement of major safety groups in the industrial cyber security initiative that really got my attention. Here’s what he had to say: “This year, security consultancies like TÜV will make a major push into the SCADA and process security markets … and the IEC safety standards will start to be reevaluated in terms of security.” Byres added that he also hopes efforts like theDepartment of Homeland Security’s LOGIIC analysis of Safety Instrumented Systems将“也开始成为头条新闻,不要隐藏在蒲式耳下。”
虽然我们在Eric牛栏的主题,我想要的to announce that we have just confirmed his participation in The Automation Conference 2013, to be held in Chicago on May 14-15. Eric will deliver a keynote presentation on cyber security and automation systems and hold court in a special “Ask the Expert” session where you can put your cyber security questions to Eric directly. Space is limited at the conference, so register today atwww.theautomationconference.com.