Welcome to the new Schneider Electric Community

It's your place to connect with experts and peers, get continuous support, and share knowledge.

  • Explore the new navigation for even easier access to your community.
  • Bookmark and use our new, easy-to-remember address (community.se.com).
  • Get ready for more content and an improved experience.

Contact SchneiderCommunity.Support@se.com if you have any questions.

Close
Invite a Co-worker
Send a co-worker an invite to the Exchange portal.Just enter their email address and we’ll connect them to register. After joining, they will belong to the same company.
Send Invite Cancel
84712members
354101posts

Staying Cybersafe When IT and OT Converge: Adding Compute and IoT at the Edge

Industrial Edge Computing Forum

Partnering with Schneider Electric for edge computing empowers System Integrators to differentiate and grow their business in today’s IIoT world through an expanded offer portfolio, essential training, risk reduction, and reduced time to market.

Ericka
Crewman Crewman
Crewman

Staying Cybersafe When IT and OT Converge: Adding Compute and IoT at the Edge

By Steven Carlini

 

In the race to digitally transform, many companies are adding a serious number of IoT sensors, meters, and high-definition video into their operational processes. Think proximity sensing and contact tracing for public transportation, IoT soil sensors in agriculture, or IoT sensors communicating with robots in manufacturing.

 

More sensors equal more data, which will most likely be processed by edge computing. But adding exponentially more devices on a network exponentially adds more “windows” to open for a potential cyber-attack. These windows of vulnerability are keeping information technology (IT) managers and operational technology (OT) managers up at night.

 

Converging of IT and OT presents a new challenge to security practices

In the past, IT and OT have maintained a clear distinction, never overlapping their boundaries. The distinct separation between IT and OT departments has been characterized by organizational silos and ingrained into the company culture. Historically, IT systems have been used for managing business applications in the front office. OT was usually made up of fully complete and proprietary systems in operations. In today’s operations like factories, IT and OT are converging — propelled by the need to automate for higher productivity and flexibility. OT managers are excited by the possibility of increased automation and terrified about the disabling consequences of a cyber breach.

 

This converging of IT and OT systems with the increased use of IoT in industrial environments presents a new challenge to existing security practices. The focus expands from protecting a centralized, single entity to protecting many distributed edge sites with tens, hundreds, or thousands of attached IoT devices.

 

Securing edge computing installations and endpoint devices

We decided to write white paper 12: An Overview of Cybersecurity Best Practices for Edge Computing to provide guidance on how to secure edge computing installations and the associated exponential rise in endpoint devices. The overview of best practices is provided for each of these four elements:

 

  1. Device selection criteria
  2. Secure network design: Defense-in-Depth Network (DDN), network segmentation, intrusion detection system, Secure Access Service Edge (SASE)
  3. Device setup/configuration
  4. Operation and maintenance: patch management, vulnerability management, penetration testing

These practices reduce the risk of breaches. The white paper provides examples for these practices along with associated cybersecurity standards. The paper also discusses how Microsoft introduced the Security Development Lifecycle (SDL) and IEC 62443, which is accepted worldwide in defining security standards developed by industrial control experts.

 

One of the most overused and abused phrases
It is true that one of the most overused and abused phrases is IT and OT convergence. But it’s really starting to happen when adding edge computing and IoT sensors into OT applications, presenting new cybersecurity challenges.

 

Whether you are directly responsible for the ongoing operations or are an IT manager responsible for overall cybersecurity, you would benefit from reading the overview and recommendations in white paper 12: An Overview of Cybersecurity Best Practices for Edge Computing. You may even sleep through the night.

 

 

Tags (1)