IEI: Securing IIoT

Wednesday, October 21, 2015 @ 10:10 AM gHale

By Gregory Hale
Greater connectivity means more knowledge which means increased opportunities and it all revolves around security.

“Security is one of the key points when we talk to industrial companies,” said John Herold, vice president of global industrial marketing at Belden during his Wednesday presentation at the IEI Design Seminar in Schaumburg, IL. “We have found security is a key entry point. It has to be thought of.”

IEI: Wireless Needs Security
IEI: Secure Network Design Principals
Unsupported ICS: Not an Easy Upgrade
Remedy to Fix Unsupported PKS Hole

During his talk, Herold made it clear greater connectivity is coming and right now the buzz phrase is the Industrial Internet of Things (IIoT). With that increase in connectivity, the attack surface for the industrial sector skyrockets. That means security needs to have a stronger presence in the industry than it currently has.

While the talk around the industry centers around IIoT, few people have really moved forward with thoughts and ideas on what users could do to reap the benefits from this movement toward greater connectivity.

With the impact from IoT expected to reach $11.1 trillion by 2025, Herold wanted to talk about the five steps to benefit from the IoT’s brother, IIoT.

These five steps are:
1. Assess
2. Migrate/update
3. Proper design
4. Protection
5. Monitor

While he did talk about the five steps, keep in mind they all revolve around ensuring they remain secure.

When it comes to the assess stage, users must know what they have, where it is, what it does and who owns and manages it.

In the mitigate/update stage, users should make Ethernet their foundation. “You need to consider security risks with each new connection to the system,” Herold said.

In creating the right design, end users need to focus on the network and create a zones and conduit segmentation model. They must also understand the security risks and be able to benchmark the network against industry best practices.

In the growth step, users can get caught in a cycle. Yes, they are growing and that is a good thing, however, that also means they are more vulnerable. “There are internal risks, but also external risks,” he said. At this point, part of the protection model calls for overlapping security.

“Overlapping security layers simply reduce risk,” Herold said. “Learn which areas need to be protected. You will never be able to totally protect everything in your network, it would be way too expensive.”

The fifth stage talks about monitoring the network. “Technology changes, which means the network will change,” he said. That means users need to make a plan which calls for regular maintenance, constantly monitoring the network, system failure alerts and establish response protocols.

“IIoT is real, it is not going away,” Herold said. To take advantage of IIoT users “need a sound infrastructure. We should be using real-time data, that is the key.”