Security Approaches for Industrial Internet of Things

Security Approaches for Industrial Internet of Things

GaryThumb14Personal interlude

After leaving the “magazine editor business” a year ago, probably for good as a full-time editor anyway, I turned to just keeping this blog active. Readership has increased slowly but steadily over the past eight months. About as many people will see an article here as on a magazine Website (not as many total as a magazine Website, but they have much more content).

I decided not to pursue advertising as a revenue source. That seems to be the old way. It’ll hang on for a long time, but growth is not there.

Most of my business is consultation of various kinds including messaging and marketing, research, analysis, Web and digital development, and leadership.

It is more fun and insightful than trying to keep sales people and advertisers happy while forging a new message in a crowded field.

However, Manufacturing Connection will continue to bring the latest relevant news along with analysis about why you should care.

OT coming together with IT

I have been fascinated with what we now call the IT/OT divide (information technology professionals versus operations technology professionals) since about 1986. About that time my company was designing, building, and selling automated assembly machines to industry. Our largest customer was General Motors.

General Motors, in a gigantic brain fart, acquired EDS. And, predictably, it succeeded in totally destroying the EDS culture and making it like GM. That is to say, cumbersome, lethargic, bureaucratic.

But one day a senior manager went through the controls engineering department of one of my best customers and said, “You’re EDS,” “You’re GM.” Then they told us, “GM has the wire from the controller to this terminal block, and EDS has the wire from that terminal block to computers.”

Thus began our difficulties with GM and controls on our machines.

Rockwell and Cisco

These days, noted GM (and many others) OT supplier Rockwell Automation and noted IT supplier Cisco have joined forces to provide architectures, technology, and training designed to bring these forces together.

After 30 years, it’s about time.

Previously the two companies tackled training. With this news, they have tackled security for the Industrial Internet of Things. Most of the following is taken from their joint press release (meaning I didn’t delete some of the superlatives).

The two additions to their Converged Plantwide Ethernet (CPwE) architectures are designed to help operations technology (OT) and information technology (IT) professionals address constantly changing security practices. The latest CPwE security expansions, featuring technology from both companies, include design guidance and validated architectures to help build a more secure network across the plant and enterprise.

The Industrial IoT is elevating the need for highly flexible, secure connectivity between things, machines, workflows, databases and people, enabling new models of policy-based plant-floor access. Through these new connections, machine data on the plant floor can be analyzed and applied to determine optimal operation and supply-chain work flows for improved efficiencies and cost savings. A securely connected environment also enables organizations to mitigate risk with policy compliance, and protects intellectual property with secure sharing between global stakeholders.

Core to the new validated architectures is a focus on enabling OT and IT professionals to utilize security policies and procedures by forming multiple layers of defense. A defense-in-depth approach helps manufacturers by establishing processes and policies that identify and contain evolving threats in industrial automation and control systems. The new CPwE architectures leverage open industry standards, such as IEC 62443, and provide recommendations for more securely sharing data across an industrial demilitarized zone, as well as enforcing policies that control access to the plantwide wired or wireless network.

“The key to industrial network security is in how you design and implement your infrastructure and holistically address security for internal and external threats,” said Lee Lane, business director, Rockwell Automation. “The new guidance considers security factors for the industrial zone of the CPwE architectures, leveraging the combined experience of Rockwell Automation and Cisco.”

Rockwell Automation and Cisco have created resources to help manufacturers efficiently deploy security solutions. Each new guide is accompanied by a white paper summarizing the key design principles, as follows:

The Industrial Demilitarized Zone Design and Implementation Guide and white paper provide guidance to users on securely sharing data from the plant floor through the enterprise.

The Identity Services Design and Implementation Guide and white paper introduce an approach to security policy enforcement that tightly controls access by anyone inside the plant, whether they’re trying to connect via wired or wireless access.

“Security can’t be an afterthought in today’s plant environment. As we connect more devices and create more efficient ways of operating, we also create certain vulnerabilities,” said Bryan Tantzen, senior director, Cisco. “Cisco and Rockwell Automation have been teaming for nearly a decade on joint solutions, serving as the standards-based resource for security in industrial environments. These new architectures and guides build on our collaboration by helping organizations recognize and proactively address today’s security concerns.”

Companies can now take advantage of industry-leading solutions from Rockwell Automation and Cisco to address security from a holistic perspective. Together, the two companies provide a common, scalable architecture for ruggedized industrial Ethernet and enterprise networks, along with unique services, such as security assessments and managed security, to help manufacturers define and meet performance metrics and scale in-house resources.

This announcement further extends the commitment by Rockwell Automation and Cisco to be one of the most valuable resources in the industry for helping manufacturers improve business performance by bridging the gap between plant-floor industrial automation and higher-level information systems.

Security Approaches for Industrial Internet of Things

Four Automation Trends Reflected At Rockwell Automation TechED

Some old issues were addressed in new ways by Rockwell people at Rockwell Automation TechED in San Diego Monday (June 1).

  • Workforce
  • IT/OT Convergence (or not)
  • Connected Enterprise
  • Mobility (or the breakdown of silos—finally)

Workforce

We continue to talk about the coming Armageddon of baby boomer retirements and domain expertise walking out the door. This conversation has been ongoing for more than 10 years. We’re still talking.
One proposal here at Rockwell is to increase use of the technology that Millennial generation understands. That suite of technologies and devices are integral to Rockwell’s Connected Enterprise vision.

Another solution comes through the training/workforce development business. That group has begun to provide training and education beyond traditional (to Rockwell) electrical, motor control, and automation. It offers basic math, leadership, mechanical crafts, and more.

IT/OT Convergence

Once again training comes to the front. Partnering with Cisco, Rockwell has developed a specialized class beyond the Cisco CCNA certification—CCNAI. This training goes beyond traditional enterprise networking to include networking crucial for manufacturing and production.

The target market for this training is also non-traditional. It includes those presently working in enterprise IT. The hope is that this training will bring together information technology and operations technology (IT/OT) people and finally move the needle on this sticky organizational problem.

Connected Enterprise

My meeting with a representative of this initiative is set for later this morning. However, I’ve already had many conversations and attended a “Super Session” on the topic.

Connected Enterprise at this point reflects the Internet of Things and is the vision pointing to smart manufacturing. According to an Accenture study about 84% CxO executives see potential revenue streams from IoT, but only about 6% doing something about it

The Rockwell mantra for this conference is Intelligent Assets Controlled by Intelligent Software.

Mobility

Mobility for Rockwell goes far beyond just adding a few visualization tools to smart phones and tablets. It actually reflects the breaking of silos within the company. I’ve seen this developing for several years—especially with the current executive management team.

So, mobility becomes a cross-division effort so that all the various product groups come together so that there is a Rockwell app, not a drives app, a motion app, a control app, and so on.

Mobility also leads to the next age of automation—management by exception. Steve Gillmor of the Gillmor Gang, a popular tech conversation (podcast), talks often about the power of notifications. Notification leads to management by exception. That is where Rockwell is heading.

Construct a Website That Builds Business-Automation Integrators Lag

Construct a Website That Builds Business-Automation Integrators Lag

Jon DiPietroAuthentia has published a comprehensive study of the control system integrator industry’s digital marketing performance. You can find additional information on the author’s blog. Many industrial/manufacturing industries lag behind in their adoption of modern digital marketing practices, largely due to target demographics that have been slow to embrace social media and mobile computing. This has especially been the case in the control system integrator industry. However, with digital trends accelerating and workforce demographics rapidly changing, businesses are being forced to adapt quickly.

[Disclaimer: I have a relationship with Authentia; I also hired it to construct a Website for Maintenance Technology magazine; Jon DiPietro built this site for me two years ago. Obviously, I like their work.]

Authentia randomly selected 100 North American control system integrators and assessed their digital marketing effectiveness against 32 separate criteria. The results indicate areas of opportunity for control system integrators to take advantage of industry-wide latencies. Owners, business developers, and marketing professionals will find this information valuable in assessing their own efforts and opportunities against their peers and competitors.

“With my background in industrial controls and leadership positions in the International Society of Automation (ISA), control system integrators are near and dear to my heart,” said Authentia Strategic Marketing Consultant Jon DiPietro. “I have many friends and colleagues who work in that industry. Over the past few years, I’ve conducted dozens of digital marketing assessments for control system integrators and other automation companies. I thought it would be interesting to conduct an industry-wide assessment and see how the industry as a whole is adapting to digital marketing trends.”

Key findings from the report include:

Websites are outdated in terms of messaging and technology:

  • 79% of CSI websites we analyzed make site visits from a mobile device difficult or impossible, alienating nearly half of their web visitors.
  • 48% of the website cannot easily change site content or even enable blogging, as they do not use a Content Management System (CMS).
  • 45% of all sites studied make no attempt to establish trust with site visitors through the use of social proof, such as testimonials, awards, certifications, memberships, etc.

Search engine marketing is nearly non-existent in the industry:

  • 3% of websites surveyed were determined to be paying for advertisements on search engines.
  • 85% of CSI websites had a Domain Authority below 40, which is a measure of how much clout a website carries with search engines.
  • 42% of websites did not have any analytics operating which track their performance.

The industry has not yet adopted content marketing as a strategy:

  • 67% of those studied do not list or promote social media accounts, such as Facebook or LinkedIn
  • 65% of websites have no blog or news feed.
  • 12% had a blog and published industry-focused content (as opposed to company news).
  • 88% of websites surveyed did not incorporate social sharing buttons, making their content difficult to find and share.

There are very few mechanisms in place to interact with prospects:

  • 2% of websites were connected to a marketing automation tool.
  • 84% of websites surveyed did not utilize visible call-to-action buttons.
  • 95% of websites failed to use landing pages, which contain an offer designed to collect information from prospects.

The 2015 Control System Integrator Digital Marketing Benchmark Report can be downloaded for free at www.authentiasoft.com/2015-csi.

End Note

I just went through my list of RSS feeds for blogs and Website changes that I’ve accumulated over the past several years. No fewer than 20 of them had not been updated for two years. I could not believe the number of companies who started a very good information and content system, and then they just bailed out on it. When I think of the lost opportunities for these companies, I just shudder.

Security Approaches for Industrial Internet of Things

Introduction to Systems Thinking to Solve Wicked Problems

Here is a thought provoking TED Talk from Tom Wujec, a Fellow at Autodesk where he helps leadership teams solve complex challenges and design their future with emerging digital technologies. He uses the metaphor of drawing the process of making toast to eventually get groups thinking about using systems thinking to do what he calls “Wicked Problem Solving.”

Following is a his 8 steps process:

An Introduction to Systems Thinking and Wicked Problem Solving

DrawToast workshops are a great way to get groups to think freshly about mental models. In just 3 minutes, each person sketches a diagram of how to make toast. When comparing diagrams, people are shocked at how diverse the diagrams are, revealing a wide range of models of what’s important in making toast. It’s a great launch pad for drawing out what’s really important to the group.

There are 8 Simple Steps to the DrawToast Exercise:

Step 1

Prepare

Get the ingredients: felt markers, thick paper stock, sticky notes or index cards, and masking tape. Stage your room with tables, chairs, and a clear wall where you can post your work. It’s important to have enough room for all participants to see everyone’s creations.

Step 2

Invite

In your invitation, set expectations that your meeting will focus on building a systems model  of an important challenge – clarifying your vision, improving cash flow, figuring out the next bold challenge. Begin with a simple design exercise.

Step 3

Conduct

Run the meeting informally. Hand out markers and paper to everyone and ask people to draw a picture of how to make toast.

Give them 2-3 minutes.

You may want to play toast-making music…

Step 4

Reflect

Have each person hold up their drawing for all to see. (Let the laughter start) Have the group place their drawings on a large wall space and comment on the drawings; pointing out which are simple and complex, which have people and which don’t.

Step 5

Play the TED.com DrawToast video and let it explain the big ideas about systems thinking. After it plays, ask the group how many nodes they drew and what kind?

Step 6

Draw Your Challenge

Have people draw a picture how to improve what what they are working on as a group. This can include almost anything, strategic or tactical. See ‘Draw Questions’ for inspiration. Make sure people draw individually and in silence.

Step 7

Share

Have people work at tables. showing and explaining their diagrams. Compare and contrast the diagrams and see what is similar and different between them. What links and nodes are common?

Step 8

System

If you have the time, have the group develop a systems diagram of the challenges using sticky notes and drawn links. Building on the previous individual diagrams, have groups of 4-6 people create nodes and links to to solve the challenges.

Security Approaches for Industrial Internet of Things

Lure of Lifestyle or Managing Simply

Jim Pinto w beardOne thing about living most of my life in the same small city, I have seen many people grow from stage to stage in life. I remember when a bunch of guys were in their 30s and 40s. They were posturing for importance. Living an upscale and hard-driving lifestyle. Now they are 60s and 70s. They, for the most part, have come to see what’s really important in life—relationships, service, being comfortable in who they are.

Lure of Lifestyle

My friend Jim Pinto, who has turned his attention from automation (since he doesn’t write for me anymore) to thoughts on how to live, reminds us to focus on what’s important. In Lure of Lifestyle, he says, “Now, I don’t feel particularly miserly, but I really don’t understand the rationale of the luxury lifestyle. In fact, I remember the remark of a guy who ignored the champagne at a fancy reception and asked for a beer. “Hey!” he said, “I’m rich enough to drink what I want, not what looks good.”

These days, when I see somebody posturing beyond their means, I remember a Texas cattleman’s wisecrack: “Big hat, no cattle!” This was the name of a song by Randy Newman.”

Fits a Career

I think this fits a career, too. Most of the time I’ve been in leadership (I wish I had been this good all the time), the important question became, “How can I help you?” After defining roles and hiring the best people (I’ve missed a few times, much to my downfall—one guy turned out to be quite the political manipulator), that is the best approach to management.

I’m reminded of a story about a guy who was trying to impress neighbors in an upper middle class neighborhood. One neighbor was actually quite wealthy, although you’d never know it from the way he lived (with simplicity).

Seems the guy seeking to impress through a party for his “friends” in the neighborhood. He gave the guests a tour of his wine cellar–his pride and joy. Then he showed the big prize–a very expensive bottle of wine.

The rich guy said, “Well, let’s just pop that thing open and see how good it is.” I’m saving it for a special occasion was the reply. “Heck,” continued the rich guy, “you’ve got all your friends over here for a big celebration. This is a special occasion.”

Think he knew that that bottle of wine was just for show? Only there to impress people?

Management style

As we lead and manage, we should check to see how much display we have around us meant only to impress. This can be changed to thinking about how much we can help others so that we together accomplish awesome results.

 

Follow this blog

Get a weekly email of all new posts.