Featured Image

Protecting an OT vs IT Network: Practice and Procedure Differences

The types of equipment connected to OT networks (manufacturing) are fundamentally different than the equipment connected to an IT network (office). This difference represents a whole new set of challenges for IT professions attempting to extend their ...
Nov 23, 2021

The types of equipment connected to OT networks (manufacturing) are fundamentally different than the equipment connected to an IT network (office). This difference represents a whole new set of challenges for IT professions attempting to extend their business’s network into the manufacturing environment. The equipment isn’t the only difference faced by IT professionals who are tasked with addressing the OT world. Many of the practices and procedures traditionally applied to managing IT networks, and the security policies applied to those networks, conflict with the reality of the manufacturing shop floor.

For example, a common practice for managing an ethernet-based network is to assign a specific series of IP addresses to devices connected to the network, or different series of addresses to individual portions (segments) of the network. This practice makes it easier to implement various tasks associated with managing the network – identifying logical groups of equipment, enabling security methods to control the flow of information across the network, and enabling software updates to be automatically distributed to equipment attached to the network. 

To implement this practice, it is necessary to configure each piece of equipment with a specific IP address. This can be problematic for some of the equipment found in the manufacturing environment. The controllers on newer manufacturing equipment tend to support re-assignment of IP addresses. Older equipment, which represents the majority of equipment installed on the shop floor, either does not have the ability to have its IP address changed or changing the address requires interruption of the process being executed on that equipment when making these changes. For the equipment that does not support changing the IP address, it becomes necessary to install an edge computing device which isolates the equipment from the network. That edge computing device then becomes the “managed device” on the network. While effective, installing these devices are an extra expense.

Whether a company reassigns the IP addresses for their equipment or not, the standard IT practices and procedures for deploying security software and associated operating system patches can cause significant problems for shop floor equipment. All shop floor equipment that is not isolated from the plant network by an edge computing device is exposed to software updates that may be deployed across the network.

Many pieces of equipment connected to the network do not incorporate a standard “PC-style” operating system. For these systems, security software cannot be installed directly on the equipment, leaving individual pieces of equipment with no local security protection. Network security for this equipment is relegated to higher-level systems that manage the security functions for entire segments of the network. This leaves these systems exposed to security risks associated with system-to-system communications within the network segment.

Other equipment may support a standard “PC-style” operating system. However, installation of additional software or updates to the operating system may be incompatible with the operation of the control system on these pieces of equipment. The impact of these software changes can vary significantly depending on each control system. For some systems that are designed to be highly dependent on a specific hardware/software configuration, the impact is usually very obvious and significant. The system simply will not function. Not only is this an immediate problem from a production standpoint, it can also result in significant downtime, since rebuilding these systems to their original configuration can be difficult and time consuming. Typically, companies have backups of the application software on these systems. However, the operating system is typically not backed up, and many of these older operating systems are no longer commercially available. Also, the tools (disk drives, floppy drives, etc.) and media required to rebuild the operating systems are no longer available either. A simple software download can result in a major headache for the business.

Another significant scenario is the case where the software update does not cause a major failure to the system but does impact the performance of the system. This performance change may not be immediately obvious, but the long-term impact to productivity can be significant. These cases are hard to identify quickly and may only become obvious when analyzing longer-term production data.

The OT network is the foundation of any digital manufacturing infrastructure. It is critical that IT professionals working in the OT environment fully understand the unique characteristics of the control systems installed on each piece of equipment on the shop floor and the impact of applying network security policies and software maintenance procedures to these control systems. What works in the office environment most likely will not work in the shop floor environment without modifications to accommodate for the different types of equipment. 

Ideally, the shop floor would look just like the office environment from an IT perspective. To do this, every piece of equipment must either have the same characteristics as an office PC or must be isolated from the network with a device that hosts the network security functions. The reality is that this option is not practical due to both the types of equipment required to support manufacturing operations and the costs that would be associated with isolating each piece of equipment with an edge computing device. Therefore, the most realistic approach to securing an OT network is to adapt traditional IT practices and procedures to the unique environment of the shop floor. 

PicturePicture
Author
John Turner
Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute.
Recent technology News
The quality and fidelity of simulation have evolved so dramatically that many manufacturers don’t even know what is possible to accomplish using simulation.
These are tools to achieve an end such as a reduction in cost or new opportunities that lead to more revenue. But what happens when the results are less than expected?
Entities working toward continuous improvement and smoother operations management as well as users, builders, and developers of additive, automation, subtractive, workholding, and metrology have been making manufacturing technologies change...
When it comes to digital twins and digital threads, there is no widespread agreement what they are and how the can be expressed in terms of data artifacts. This presentation proposes a standards-based definitions...
NSF’s mission is to promote the progress of science to advance national health, prosperity and welfare. To fulfil this mission, the ENG directorate invests in engineering research and education to foster innovations for the benefit of society.
Similar News
undefined
Technology
By Benjamin Moses | Nov 19, 2021

Sustaining a massive shift in U.S. Manufacturing. Guys, I can predict the future. Material flex. Yup, managing data is a thing now. Let’s have an honest conversation on cybersecurity.

5 min
undefined
Intelligence
By Nina Anderson | Nov 18, 2021

The statistical perspective of significance should not be confused with the practical sense of significance. Consider the difference between something having strategic importance versus something being statistically significant.

5 min
undefined
Technology
By Benjamin Moses | Oct 15, 2021

The quality and fidelity of simulation have evolved so dramatically that many manufacturers don’t even know what is possible to accomplish using simulation.

5 min