Loading
Blog | Cybersecurity
Recent ActivityRecent Activity

Panduit's Tips to Securing Your Network

Add a level of security to your industrial network

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail
Physical Port Security in Industrial network deployments

All around we see technology adoption growing and accelerating across manufacturing and process automation, e-commerce supply chain, and distribution. Technology and automation can offset a manufacturer’s lack of access to skills and expertise, as well as labor shortages. They can also help a company achieve business goals around improving productivity, speed to market, sustainability, and safety. It's been reported that the Fourth Industrial Revolution technology advancements have accelerated per capita GDP growth at 20X …wow!

When you consider your digital transformation strategy and the investment to be made, cybersecurity should be a critical element to your investment, so that you can deploy networks that will perform for the long term while also being robust and secure from the threats of bad actors.

Here are some tips to consider when planning a cybersecurity strategy:

1. There is value in a Defense in Depth Strategy

Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are implemented to protect valuable data and information.  

A good DiD strategy will include a thorough review of external and internal threat vectors as well as a best-in-practice approach to the logical network design, including:

  • Utilizing the industrial security zone or iDMZ (industrial demilitarized zone)
  • Computers and endpoint protection
  • Authentication and authorization
  • Common Industrial Protocol (CIP) security overview
  • Asset management and recovery
  • Patch management
  • Secure remote access
  • Industrial Control System (ICS) threat detection
  • A planned logical network architecture such as the Converged Plantwide Ethernet architecture (CPwE)

For more tips on configuring your logical network when building a secure network infrastructure visit our webpage.

2. Insider Threats are Real

Insider threats are real. They could be current or former employees, contractors, or business associates. More than half of those surveyed by cybersecurity-insiders.com think it is more difficult to detect and prevent insider threats than external cyber-attacks.

3. Physical Network Layer Planning is a Key Element of Defense in Depth

Physical layer planning provides a best-in-class execution plan for the network that can:

  • Reduce vulnerabilities
  • Enable controlled access to equipment to deter insider threats
  • Contribute to more effective services to, and management of network hardware

A few areas where physical network design can improve overall security of the network:

  • Industrial compute platforms for deployment of iDMZ and security hardware
  • Physical network segregation by cell zone areas, with switch distribution within zone or IDF enclosures to provide physical network isolation and limit threat impacts
  • Equipment hardening and modern badged access control and lock security options at the enclosure level
  • Access control integrated with safety protocols for control panels
  • Physical port security – it is not enough to electronically lock down ports; physical port security physically blocks the port or locks a connection into the port to deter access
    • Physical port security options:
      • Port block-out and lock-in devices
      • Lock in fiber uplink port connections
      • Block out open USB and RJ-45 ports

4. Cyber Security Standards

An understanding of important cybersecurity standards is required, along with access to design guidelines aligned to them. A few that are important to review:

a.       Key standards NIST SP 800-82, ISA-99 and IEC 62443 series, Deploying Network Security within a Converged Plantwide Ethernet Architecture – DIG, and Physical Infrastructure for the Converged Plantwide Ethernet Architecture

  • https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf
  • Understanding IEC 62443 | IEC
  • https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td019_-en-p.pdf
  • Physical Infrastructure for the Converged Plantwide Ethernet Architecture Application Guide ENET-TD020A-EN-P (panduit.com)

5. Getting Started on the Physical Network Infrastructure

Where do you start?

Begin with an evaluation of the overall network in place, looking for security vulnerabilities. A standard network assessment, available through Rockwell Automation, provides documentation of the major network components and a base line of physical, logical and security-based elements relative to industry standards. It has an expanded review of the physical network to ICT standards – important for IT managers – jointly created by Panduit and Rockwell Automation. It operates with minimal disruption to your production environment and includes a program report with recommendations and remediations.

Published May 31, 2023

Basic security stack for cyber strategy
 
 
 
 
 
 
Industrial Distribution Frame

Industrial Distribution Frame with G5 Access Control and LC fiber port security.

 
 
 
 
 
 
Networked Absence of Voltage Tester with Access Control

VeriSafe 2.0 - Networked Absence of Voltage Tester with Access Control.

 
 
 
 
 
 
Physical Port Security in Industrial network deployments

Physical Port Security in Industrial network deployments.

 
 
 
 
 
 
Design for iDMZ cabinets, using MDC platform- From Physical Infrastructure for the Converged Plantwide Ethernet Application Guide

Design for iDMZ cabinets, using MDC platform- From Physical Infrastructure for the Converged Plantwide Ethernet Application Guide.


Michael Berg
Michael Berg
Senior Business Development Manager, Panduit Corp
Michael Berg is a Sr. Business Development Manager for Industrial Network Infrastructure for Panduit Corp, a global leader in network and electrical infrastructure solutions based in Tinley Park, Illinois. In this position Michael is responsible for business development and programs for Warehouse Automation, Industrial and Manufacturing markets. Michael has been with Panduit for 32 years and has experience ranging from research and development, product management, marketing and solutions marketing and business development. Michael has expertise in industrial networking and infrastructure solutions, control panel solutions and partnering programs. Michael is a graduate of University of Illinois at Chicago, with a BS in Marketing.
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
Recommended for You
Loading
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right