Securing the Smart Factory
Attributed to: Alex Nehmy, Field Chief Security Officer, Critical Industries, Japan & Asia Pacific, Palo Alto Networks The incredibly competitive manufacturing industry has evolved from labour-intensive manual processes to progressively more intelligent systems driven by the computing power of the digital revolution. Even more so with the supply chain shifts resulting from the ongoing trade wars, particularly within the digital technology manufacturing sector. The Chip War is an example of how tensions between the US and China are escalating, as both countries compete for dominance in chip manufacturing and technological innovation. This reorganisation of the supply chain has also resulted in Asian countries such as Thailand, India, and Vietnam stepping into the race as specialised manufacturers. This competitive nature is driving the adoption of digital, highly automated systems, which reduce labour costs and significantly increase production efficiency. Through this digital transformation, we’re seeing the wider implementation of digital twins – a digital model of the material manufacturing environment – to achieve highly automated manufacturing processes. In a Smart Factory, the digital twin receives data on the physical manufacturing process from IoT sensors. The digital twin is often cloud-based and uses machine learning to make sense of the IoT data, making decisions that change the manufacturing processes as needed to improve efficiency further and minimise issues. Security Vulnerabilities Plaguing Smart Factories While digital twins and other connected components of the cyber-physical system of a smart factory provide efficiency, they are not immune to security risks, and instead widen the attack surface of an already highly-targeted sector. IoT devices are often shipped in an inherently insecure state, and patching them is difficult due to availability constraints and the sheer diversity of the devices with many different manufacturers and patches. Unmonitored and unsecured IoT devices are among the top 3 cybersecurity challenges faced […]