WIBU-SYSTEMS

Perfection in Protection, Licensing, and Security

Industrial Control Systems and the Cloud: A Match Made in Heaven

MarketingWIBU-SYSTEMS AG el 2 de septiembre de 2021 13:17 horas

Are there any foreseeable boundaries for digital transformation? It doesn’t seem so, as the exponential increase of millions of connected devices and the creative IoT applications that have emerged show no signs of dissipating. And even though industry has been a bit slower to respond, the perceived benefits of smart devices, systems, and entire factories are gaining momentum and driving the convergence of IT and OT in the world of the Industrial IoT. At the heart of digital transformation are Industrial Control Systems (ICS). ICSs include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and Programmable Logic Controllers (PLC). The control systems connect with devices such as sensors, valves, pumps, and motors, via Human-Machine Interface (HMI) workstations that collect all data from these external devices, create reports, triggers alarms, and send notifications.

Until recently, technology adoption in industrial control systems lagged due to the complexity of system requirements, such as the high availability and reliability of systems coupled with significantly longer lifecycles. However, technology is rapidly advancing, and it is not surprising that ICS is moving to the cloud. According to a Darktrace blog post, “the conditions brought about by the pandemic year have brought unique challenges to the management of SCADA systems on site, causing organizations to consider secure ways to slowly transition these environments to the cloud.”

The benefits of bringing cloud capabilities to ICS are real: better and faster data communication and analysis of device performance, management of device configuration, improved diagnostics and troubleshooting, a centralized view of processes, redundancy, and scalability, among others. But the usual fears of data insecurity in the cloud persist and ICS infrastructure has become a popular target for cyberattacks. In addition to financial gain, attackers steal trade secrets and interrupt production processes. These attacks not only adversely affect the assets of the targeted organization but can endanger human lives.

Despite the risks, vendors, system integrators, and IT hosting companies are offering an array of ICS-SaaS offerings and products that provide various forms of cloud implementations for industrial control systems. Different cloud deployment models, such as private, community, public and hybrid, provide an array of configurations and implementation possibilities, and each model carries its own risks.

So, how can ICS vendors protect their cloud environment and ensure the security of their data? First, vendors can follow the guidelines set forth in security best practices documents, like the Industry IoT Consortium’s (IIC) Industrial Internet Security Framework Technical Document, which attempts to identify, explain, and position security-related architectures, designs and technologies, as well as identify procedures relevant to trustworthy Industrial Internet of Things (IIoT) systems. It describes their security characteristics, technologies, and techniques that should be applied, methods for addressing security, and how to gain assurance that the appropriate mix of issues have been addressed to meet stakeholders' expectations. Another educational document of relevance is the IIC’s IoT Security Maturity Model: (SMM), which indicates a path for Internet of Things (IoT) providers to know where they need to be and how to invest appropriately in sensible security mechanisms that meet their needs and requirements. It seeks to help organizations identify the appropriate approach for effective enhancement of these practices where needed.

ISC vendors can also rely upon the expertise of proven security technologies from industry experts like Wibu-Systems to protect their cloud implementations. Wibu-Systems has adapted its CodeMeter software protection, licensing, and security technologies for embedded devices, PLCs, IoT devices, and software operating in the cloud. CodeMeter use cases have been well documented for protection against illegal copying of software that runs on these devices and protection against disassembly and reverse engineering. CodeMeter has also proven valuable for protecting the integrity of the software running on the system as well as protecting the Intellectual Property, such as blueprints or proprietary process recipes, used by the vendor’s customer to produce products.

Another interesting use case for vendors with edge-connected devices or those residing in the cloud are novel software licensing models. With a technology like CodeMeter, vendors can go beyond traditional perpetual license models and consider new consumption based or subscription licensing that may be more attractive to their customers and generate new revenue opportunities.

You can learn how CODESYS, one of the leading hardware-independent IEC 61131-3 programing systems used to create controller applications, has fully integrated CodeMeter for their protection, authentication, and licensing solutions. Just watch the dedicated on-demand webinar.

Inicie sesión o regístrese ahora y disfrute de todas las ventajas de una comunidad.

Para obtener toda la funcionalidad del Foro de IndustryArena es necesario iniciar sesión o registrarse. Este proceso es absolutamente gratuito.

Password forgotten?
Solicitud de contacto
Guest Photo
Your message
The controller within the meaning of Art. 4(7) GDPR is: IndustryArena GmbH, Schneiderstr. 6, 40764 Langenfeld, Germany.
You may reach our data protection officer under dataprotection@industryarena.com.

Purpose of processing
We process your personal data concerning the use of the contact form and the communication with the company of the newsroom as well as the transmission of your data to this company in accordance to Art. 6 (1a) GDPR. This constitutes a legitimate interest for us in accordance to Art. 6 (1f) GDPR.

Recipient of the data
Within our organization, those units gain access to your data, which are necessary to fulfil the above purposes.
Personal data will only be transmitted to third parties if this is necessary for the aforementioned purposes or if another legal basis exists. If necessary, we conclude the corresponding data protection agreements with third parties, in particular pursuant to Art. 28 GDPR.

Data storing
Your data will be transmitted to the company of the newsroom for further processing. The period of storing is the duration of the processing of your request by the respective company.

Seleccionar persona de contacto

Newsroom Logo

Opciones de diseño

  • Título Color de fuente:
  • Contenido Color de fondo:
  • Contenido Color de fuente:
  • Navegación Fondo:
  • Ficha Color de fuente:
  • Pestaña activa Color de fuente:
  • Enlace Color de fuente:
  • Enlace activo Color de fuente:
  • Imagen de fondo Color de fondo

    ¿Cómo quieres colocar la imagen de fondo?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Establecer el enlace para la imagen de fondo

  • Gráfico de cabecera

    ¿Cómo desea alinear el banner?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Introduzca el destino del enlace para el banner

  • Skyscraper

    Introduzca el destino del enlace para el Skyscraper

Tenga en cuenta:

Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.