Establishment of a CLPA Working Group on Industrial Ethernet Security

最近,它和OT世界已经开始重叠。虽然这给制造带来了许多好处,但它也意味着工厂的工作人员现在也需要考虑其对其运营的安全威胁。

This content was submitted directly to this website by the supplier.

最近,它和OT世界已经开始重叠。虽然这给制造带来了许多好处,但它也意味着工厂的工作人员现在也需要考虑其对其运营的安全威胁。需要考虑和实施这些风险的实际措施。从工厂系统的角度来看,据说,保护要求的优先级是可用性,完整性和机密性。与IT系统的另一个不同是“人为因素”。人员在厂房,制造,维护或管理植物。还应考虑指定与目标工厂系统相关的人员的作用和授权。

CC-Link IE Security Working Group (WG)

Both physical and cyber security measures have to be considered for plant security. In general, one measure is insufficient and the “defense in depth” concept, combining multiple measures, needs to be contemplated.

System security architecture

Physical access control

Industrial network security access control, integrity, and confidentiality

Security monitoring

Scope of the CLPA Security WG

CLPA安全WG的第一步专注于网络安全,特别是当用户采用无缝消息协议(SLMP)和CC-Link IE字段基本时,其中一般IP通信用于循环和瞬态通信。将创建安全网络设计的指南文档。指南文件将基于IEC62443,包括深度安全方法的防御。还描述了Secure SLMP和CC-Link配置示例的路由器/交换机配置示例也描述了字段基本。

Overview of Industrial network security

Security concerns viewpoint for industrial networks

Defense-in-depth security approach

Use-case examples

Participating Companies

The CC-Link Partner Association Ethernet Security Working Group includes participation from Cisco Systems, Hilscher, Mitsubishi Electric, HMS, Belden-Hirschmann, MOXA, Panduit and MIND.

>>For more information,click here

More in Home