Managing Identities and Data Security Vital for Industrial IoT

New security solutions are supporting digital business by providing trusted interactions between people, systems and devices along with faster, more secure access to IoT data.

Cybersecurity risks for industrial control systems are continuing to increase from threats via industrial espionage, to actual physical damage and financial loss due to downtime.  A key trend moving ahead is new technology addressing critical areas including asset and material tracking, enhanced HMI authentication and stronger VPN credentials.

A focus on secure flow of data from sensors to cloud data hubs creates an ecosystem where devices, applications and employees can receive updates on system stability and device lifespan more quickly. But overall, there is a focus on two areas: managing identities and new levels of technology-enabled secure communications.

Supporting New Levels of Enterprise Connectedness

Today, digital businesses are striving to create business models that turn stand-alone products into highly interactive and connected services, but are faced with a variety of challenges ranging from complicated integrations and extended deployment timelines to mitigating safety and privacy concerns.

Entrust Datacard, a provider of trusted identity and secure transaction technology solutions, recently announced its new ioTrust security solution. The idea is to deliver a secure and trusted digital infrastructure that safeguards data between devices, sensors, and backend platforms connected within an Internet of Things (IoT) ecosystem. By applying digital identities managed using definable policies, the new platform allows companies to create the trusted products and experiences that new production environments demand.

The ioTrust technology is focused on three areas: trusted identities, data security and creating an effective enterprise-wide architecture. A secure and trusted ecosystem of people, applications and devices enables greater supply chain visibility and is designed to span over the entire device life-cycle. Key technologies include cryptographically-enforced access control to data and functions using a hardware/software agnostic platform for managing heterogeneous industrial control environments.

To create industrial control system IoT ecosystems, there is a need to support a wide range of data and communication protocols, using edge and service gateways along with agents to manage identities and created secure data paths. A trust-based model for IoT security leverages validation services (OCSP/CRL), end point agents, hardware security modules and effective software tools and management consoles to manage what becomes a complex system for protecting key assets.

 

Model for IoT Security
A trust-based model for IoT security uses validation services (OCSP/CRL), end point agents, hardware security modules and management consoles to manage identities and create secure data paths.Image source: Entrust Datacard

 

Encryption, Authentication and Authorization

Enterprise-grade encryption technologies and expertise in establishing identity-based, trusted infrastructures includes capabilities such as identity, authentication and authorization, credential lifecycle management, and secure communications. The system uses deployment timelines, allowing organizations to more quickly realize business value in areas such as process optimization and automation, supply chain visibility, and delivery of new services. It is designed to secure IoT data across a variety of industries including industrial control systems, automotive, telecommunications and manufacturing supply chains.

A trusted Internet of Things ecosystem includes the following:

•    A secure ecosystem of people, applications and devices throughout the IoT value chain
•    Greater security visibility, spanning from device manufacturer to the final product
•    Reducing time-to-market and total cost of ownership using solutions based on heterogeneous device

Comments (0)

Please log in or register to post comments.
By submitting this form, you accept the Mollom privacy policy.
  • Oldest First
  • Newest First
Loading Comments...