ARCView Cyber Immunity 2022 - Pre Final
ARCView Cyber Immunity 2022 - Pre Final
By Thomas Menze
Senior Consultant
CONTENTS
Conclusion ...........................................................................................................................................12
Executive Overview
The Internet of Things (IoT) offers enormous economic advantage for the in-
dustry and the development of related services. Consider reduced
downtimes of machines and facilities, critical infrastructure data or autono-
mously running processes.
Technology experts and analysts predict even wider use of IoT devices and
apps in the future, which will naturally be accompanied by further develop-
ment of IoT devices, services and apps - and more and more companies want
to be part of this development. At the same time, many enterprises are acting
conservatively when implementing IoT solution strategies because IoT secu-
rity concerns are very real. IoT deployments present unique new security,
privacy and compliance challenges for enterprises worldwide.
The evolution towards Industry 4.0 with its focus on process automation and
real-time data collection and exchange plays a paramount role. This existing
infrastructure is ripe for new attacks on PLC, ICS, OT, IIoT and IoT systems
that are no longer proprietary but accessible via the Internet. With IT/OT
convergence, networked control systems now merge with IT-connected en-
terprise networks, leading to additional security risks from cross-
contamination of LAN, Internet, control network traffic.
That is why the strict separation between IT and OT has not existed for a long
time. This separation has been eliminated in many places, and not just in the
context of the digital transformation. Machines have had remote mainte-
nance access for a long time, via which the manufacturer carry out remote
maintenance. Remote maintenance is the best way to implement short re-
sponse times to problems in a cost-effective and timely manner. But
adaptions in corporate networks continue to change, driven by digital trans-
formation. Now the aim is to create even more flexible and error-free
production.
Asset owners are using new tactics to take advantage of IIoT digital capabil-
ities to increase efficiency. One example is the NAMUR NOA concept. This
uses non-reactive communication between the IIoT networks and process au-
tomation components. This means that digital methods are used to increase
efficiency, but by using a second communication channel, the digital sensor
data is separated from the traditional process automation. NAMUR de-
scribes this concept in NE 175 as follows:
“The NAMUR Open Architecture (NOA) aims to make production data eas-
ily and securely usable for plant and asset monitoring as well as
optimization.
Smart sensors, field devices, mobile devices and the ubiquitous use of IT
equipment are generating more and more data that is often difficult to access
within the classic NAMUR automation pyramid. NOA will change this by
transmitting this data over a second communication channel without affect-
ing the widely accepted advantages of traditional automation structures and
with no impact on the automation system.”
Source NAMUR
NAMUR is a large interest group from the process automation industry. The
committees within NAMUR are able to develop such safety concepts to-
gether with universities. Not every production company can define or
implement such a concept for its own requirements. The development of an
own secure communication concept requires a rethinking of the security
principles, which are based on the OT priorities availability, integrity and
confidentiality and exactly in this order.
The Outlook
Back to cybersecurity impacts and the use of IoT. The ITSRS report provides
an insight into IoT specifics.
▪ 52% of organizations are worried about collecting big data from IoT
devices because of the risk of cyber-sabotage and espionage.
Despite the increasing adoption of IoT, more than half of the companies sur-
veyed are concerned about cybersecurity and data integrity when
implementing IoT (57%). Lack of resources or budget constraints are cited as
a second reason (35%).
The IoT creates a host of new security risks and challenges for devices,
platforms and operating systems, their communications, and even the sys-
tems they are connected to (e.g., using IoT devices as a point of attack).
This can be realized with a dedicated operating system and platform devel-
opment methodology. This operating system uses a microkernel architecture
with only a few thousand lines of code, which eliminates vulnerabilities and
reduces the attack surface. This software, with a minimal number of trusted
components in the operating system was developed by Kaspersky and is
called KasperskyOS©.
The typical architecture for a Cyber Immune Gateway may look like the fol-
lowing:
Source Kaspersky
Source Kaspersky
Affected charging point owners who fail to apply the firmware update
"may risk potential unauthorized access to the charging station's web
server, which could lead to tampering and of the charging station's set-
tings and accounts," the owners were warned.
Source Kaspersky
In the process, a KasperskyOS based IoT Secure Gateway was able to en-
sure the integrity of signal processing without requiring a great deal of
maintenance or configuration. Cyber-attacks on the operating system re-
main unsuccessful. The same applies if cybercriminals try to manipulate
the data from the weather transmitters.
Conclusion
That is why this merging of OT, IT and IP can be observed in the manu-
facturing industry. To fully realize this networking is a task that takes
some time for most companies. Thus, we can observe how an entire in-
dustry is slowly moving towards Industry 4.0 by replacing equipment
piece by piece. Unfortunately, this transformation brings a number of
new cyber-threats and -risks.
Overall, IT security must become a matter of course - and not in the sense
of running in parallel, but rather being thought of from the very begin-
ning. ICS Systems have lifetimes of more than 30 years. New cyber
security concepts such as Cyber Immunity are needed here. A system that
protects against current and future cyber threats is certainly a very prac-
tical method. Cyber Immunity can be the new foundation how the digital
transformation will be implemented more securely.
To this end, OEMs and other technology market leaders are seeking part-
nerships with cybersecurity vendors to develop secure-by-design
products and make security a key differentiator as part of their solutions.
For example, to protect Industrial IoT environments and use-cases,
Kaspersky has partnered with Aprotech to develop a secure IIoT gateway
that integrates with Siemens MindSphere, IBM Bluemix, Yandex IoT Core
and other Cloud Platforms. The unique aspect of this product is the ap-
plication of the Cyber Immunity concept using KasperskyOS; enabling
industrial organizations to confidently explore the benefits of Industrial
4.0 and digital transformation.
About Kaspersky
About KasperskyOS
Acronym Reference:
ALM Asset Lifecycle Management HMI Human Machine Interface
APM Asset Performance Management IIoT Industrial Internet of Things
CPAS Collaborative Process Automation IoT Internet of Things
System IT Information Technology
CMM Collaborative Management Model MES Manufacturing Execution System
CPM Collaborative Production OT Operational Technology
Management PAM Plant Asset Management
CRM Customer Relationship PLC Programmable Logic Controller
Management PLM Product Lifecycle Management
DCS Distributed Control System ROA Return on Assets
EAM Enterprise Asset Management SCM Supply Chain Management
ERP Enterprise Resource Planning WMS Warehouse Management System
Founded in 1986, ARC Advisory Group is the leading technology research and advisory firm for industry, infrastructure, and
cities. ARC stands apart due to our in-depth coverage of information technologies (IT), operational technologies (OT), engi-
neering technologies (ET), and associated business trends. Our analysts and consultants have the industry knowledge and first-
hand experience to help our clients find the best answers to the complex business issues facing organizations today. We provide
technology supplier clients with strategic market research and help end user clients develop appropriate adoption strategies
and evaluate and select the best technology solutions for their needs.
All information in this report is proprietary to and copyrighted by ARC. No part of it may be reproduced without prior permis-
sion from ARC. This research has been sponsored in part by HIMA. However, the opinions expressed by ARC in this paper are
based on ARC's independent analysis.
You can take advantage of ARC's extensive ongoing research plus the experience of our staff members through our Advisory
Services. ARC’s Advisory Services are specifically designed for executives responsible for developing strategies and directions
for their organizations. For membership information, please call, write to, or visit our website:
ARC Advisory Group, Three Allied Drive, Dedham, MA 02026 USA • 781-471-1000 • www.arcweb.com