Last edit: 07/07/2023
The following is guidance on the step by step approach to limiting or restricting IT security threats and vulnerabilities.
1) Does it need to be connected?
2) Does it need to be connected at continuously?
3) Is the connection monitored, for example using a virtual private network (VPN) system?
4) Is the connection configurable (e.g. access for authorized persons only)?
5) Can the connection be restricted to “read only” mode (without ability to change)?
The following steps are essential to provide effective IT-security for machinery. Depending on the application, several of these steps should not be addressed by the machine manufacturer and system integrator but in the first instance by the machine user.
a) Identify
- What are the IT security threats and vulnerabilities?
- Understanding why would an entity attack the machine control system?
- What does the machine user have that is valuable?
- What are the vulnerabilities of the machine (e. g. open ports/external interfaces)?
- What are the resources that support critical functions?
b) Protect
- Develop and implement the appropriate counter measures to protect the machine. The counter measures support the ability to prevent, limit or contain the impact of a potential IT security attack. Examples of counter measures include machine control system design, internet access, access control, awareness and training, data security, information protection processes and procedures, maintenance and protective technology.
c) Detect
- Develop and implement the appropriate measures to identify the occurrence of an IT security attack. The “detect”-element enables timely discovery of IT- security attacks. Examples include anomalies and IT security incidents, security continuous monitoring and detection processes.
d) Respond
- Develop and implement the appropriate activities to take action regarding a detected IT-security attack. The “respond” element supports the ability to stop and or contain the impact of a potential IT security attack. Examples include mitigation, response planning, communications, analysis and improvements.
e) Recover
- Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to an IT-security attack. The “recover” element supports timely recovery to normal operations to reduce the impact from an IT-security attack. Examples include recovery planning, improvements and communications.