Security Approaches for Industrial Internet of Things

Security Approaches for Industrial Internet of Things

GaryThumb14Personal interlude

After leaving the “magazine editor business” a year ago, probably for good as a full-time editor anyway, I turned to just keeping this blog active. Readership has increased slowly but steadily over the past eight months. About as many people will see an article here as on a magazine Website (not as many total as a magazine Website, but they have much more content).

I decided not to pursue advertising as a revenue source. That seems to be the old way. It’ll hang on for a long time, but growth is not there.

Most of my business is consultation of various kinds including messaging and marketing, research, analysis, Web and digital development, and leadership.

It is more fun and insightful than trying to keep sales people and advertisers happy while forging a new message in a crowded field.

However, Manufacturing Connection will continue to bring the latest relevant news along with analysis about why you should care.

OT coming together with IT

I have been fascinated with what we now call the IT/OT divide (information technology professionals versus operations technology professionals) since about 1986. About that time my company was designing, building, and selling automated assembly machines to industry. Our largest customer was General Motors.

General Motors, in a gigantic brain fart, acquired EDS. And, predictably, it succeeded in totally destroying the EDS culture and making it like GM. That is to say, cumbersome, lethargic, bureaucratic.

But one day a senior manager went through the controls engineering department of one of my best customers and said, “You’re EDS,” “You’re GM.” Then they told us, “GM has the wire from the controller to this terminal block, and EDS has the wire from that terminal block to computers.”

Thus began our difficulties with GM and controls on our machines.

Rockwell and Cisco

These days, noted GM (and many others) OT supplier Rockwell Automation and noted IT supplier Cisco have joined forces to provide architectures, technology, and training designed to bring these forces together.

After 30 years, it’s about time.

Previously the two companies tackled training. With this news, they have tackled security for the Industrial Internet of Things. Most of the following is taken from their joint press release (meaning I didn’t delete some of the superlatives).

The two additions to their Converged Plantwide Ethernet (CPwE) architectures are designed to help operations technology (OT) and information technology (IT) professionals address constantly changing security practices. The latest CPwE security expansions, featuring technology from both companies, include design guidance and validated architectures to help build a more secure network across the plant and enterprise.

The Industrial IoT is elevating the need for highly flexible, secure connectivity between things, machines, workflows, databases and people, enabling new models of policy-based plant-floor access. Through these new connections, machine data on the plant floor can be analyzed and applied to determine optimal operation and supply-chain work flows for improved efficiencies and cost savings. A securely connected environment also enables organizations to mitigate risk with policy compliance, and protects intellectual property with secure sharing between global stakeholders.

Core to the new validated architectures is a focus on enabling OT and IT professionals to utilize security policies and procedures by forming multiple layers of defense. A defense-in-depth approach helps manufacturers by establishing processes and policies that identify and contain evolving threats in industrial automation and control systems. The new CPwE architectures leverage open industry standards, such as IEC 62443, and provide recommendations for more securely sharing data across an industrial demilitarized zone, as well as enforcing policies that control access to the plantwide wired or wireless network.

“The key to industrial network security is in how you design and implement your infrastructure and holistically address security for internal and external threats,” said Lee Lane, business director, Rockwell Automation. “The new guidance considers security factors for the industrial zone of the CPwE architectures, leveraging the combined experience of Rockwell Automation and Cisco.”

Rockwell Automation and Cisco have created resources to help manufacturers efficiently deploy security solutions. Each new guide is accompanied by a white paper summarizing the key design principles, as follows:

The Industrial Demilitarized Zone Design and Implementation Guide and white paper provide guidance to users on securely sharing data from the plant floor through the enterprise.

The Identity Services Design and Implementation Guide and white paper introduce an approach to security policy enforcement that tightly controls access by anyone inside the plant, whether they’re trying to connect via wired or wireless access.

“Security can’t be an afterthought in today’s plant environment. As we connect more devices and create more efficient ways of operating, we also create certain vulnerabilities,” said Bryan Tantzen, senior director, Cisco. “Cisco and Rockwell Automation have been teaming for nearly a decade on joint solutions, serving as the standards-based resource for security in industrial environments. These new architectures and guides build on our collaboration by helping organizations recognize and proactively address today’s security concerns.”

Companies can now take advantage of industry-leading solutions from Rockwell Automation and Cisco to address security from a holistic perspective. Together, the two companies provide a common, scalable architecture for ruggedized industrial Ethernet and enterprise networks, along with unique services, such as security assessments and managed security, to help manufacturers define and meet performance metrics and scale in-house resources.

This announcement further extends the commitment by Rockwell Automation and Cisco to be one of the most valuable resources in the industry for helping manufacturers improve business performance by bridging the gap between plant-floor industrial automation and higher-level information systems.

Security Approaches for Industrial Internet of Things

IoT Testbed For Condition Monitoring to Predictive Maintenance

IBM_NI_Test BedRepresentatives of National Instruments (NI) and IBM recently discussed their collaboration on a test bed demonstrating the possibilities for using Internet of Things (IoT) technologies for taking companies from Condition Monitoring to Predictive Maintenance.

Chris O’Connor, IBM General Manager of IoT who works with divisions such as Maximo told me this is a new business unit that is built around IoT. There are about 6,000 clients. The explosion of data coming from devices means that industry must change from data centers to IoT. “For us, this entails the analysis of sensors information, aggregating the information, then constructing lifecycles. This will help world adopt IoT.”

The collaboration from condition monitoring and analytics changes questions manufacturers can answer such as, can I gain competitive advantage, can I offer better warranty, change frequency of maintenance.

Jamie Smith, NI’s Director of Embedded Systems, said the test bed project will roll out in multiple phases. It demonstrates the interoperability between two industry leaders including edge computing capability from NI to IBM’s cloud technology and analytics. Therefore, users can progress from condition monitoring to predictive maintenance.

The test bed consists of a motor and a couple of fans. Various failure modes are introduced. The first go consists of NI CompactRIO communicating via MQTT to IBM. Now that the proof has been completed, other companies in the Industrial Internet Consortium have been invited to join the collaboration. “All they need to do is contribute time and resources to it,” added Smith.

The next step according to Smith is insuring that it’s end to end secure. They are working with IIC to do security assessment. They will then look at more robust assets—most likely power generation assets—hoping to work with someone with large turbines or pumps to continue to demonstrate the technology and benefits.

Following is a description from the statement on the Web.

The Condition Monitoring and Predictive Maintenance Testbed (CM/PM) will demonstrate the value and benefits of continuously monitoring industrial equipment to detect early signs of performance degradation or failure. CM/PM will also use modern analytical technologies to allow organizations to not only detect problems but proactively recommend actions for operations and maintenance personnel to correct the problem.

Condition Monitoring (CM) is the use of sensors in equipment to gather data and enable users to centrally monitor the data in real-time. Predictive Maintenance (PM) applies analytical models and rules against the data to proactively predict an impending issue; then deliver recommendations to operations, maintenance and IT departments to address the issue.

These capabilities enable new ways to monitor the operation of the equipment – such as turbines and generators – and processes and to adopt proactive maintenance and repair procedures rather than fixed schedule-based procedures, potentially saving money on maintenance and repair, and saving cost and lost productivity of downtime caused by equipment failures.

Furthermore, combining sensor data from multiple pieces of equipment and/or multiple processes can provide deeper insight into the overall impact of faulty or sub-optimal equipment, allowing organizations to identify and resolve problems before they impact operations and improve the quality and efficiency of industrial processes.

Through this testbed, the testbed leaders IBM and National Instruments will explore the application of a variety of analytics technologies for condition monitoring and predictive maintenance. The testbed application will initially be deployed to a power plant facility where performance and progress will be reported on, additional energy equipment will be added and new models will be developed. It will then be expanded to adjacent, as yet to be determined, industries.

Security Approaches for Industrial Internet of Things

Google Taking Deep Dive Into Internet of Things

I saw some Google Internet of Things news on a new site called The Information. As the technology media consolidates and fights for page views in a fragmented advertising market, Jessica Lessen developed a digital site that is subscription only. No fighting over getting ads and eyeballs.

When I started this site two years ago, I gave some thought to ads. But that seemed like a losing proposition. So right now it’s free. And the newsletter is free. You can sign up for it by clicking the link on the sidebar.

Internet of Things

Everybody wants to get into the Internet of Things parade. The Information picked up on a new project at Google. Working through its Android software, The Information notes, “Google wants its software to power any electronic device that connects to the Internet, whether or not it has a digital screen.”

To that end, Google is working on technology that could run on low-powered devices, possibly with as few as 64 or 32 megabytes of random-access memory, according to people who have been briefed about the project.

The analysis is that the technology could make it easier for other companies to build everything from “smart” fridges and light bulbs to garden monitors. Note that this relates to the consumer IoT.

Keep in mind that ever since the PC-based control revolution of the late 90s, industrial automation and control have increasingly leveraged commercial technologies for industrial uses. If Google develops a low-power, low-footprint product, this will no doubt spur further development of industrial “things”.

And, this should have the twin benefits to customers of driving down costs and providing a more open ecosystem.

More from The Information

The project has been referred by the codename “Brillo” and appears to be separate from the upcoming release of the “M” version of Android. Like the open-source version of Android, Brillo could be more like a technology blueprint than a fully loaded operating system tied to apps and services, at first.

Google is expected to discuss the Brillo software, which is initially aimed at devices for the home, during the company’s annual conference for developers next week. Google last year offered a version of Android for smartwatches, called Android Wear, to certain partners.

Google considers Brillo to be a “platform” that will help streamline a fragmented market in which developers are creating or using lots of different operating systems to power Web-connected gadgets and sensors, says one of the people briefed about it. Because the software is so different from Android, Google hasn’t yet decided whether to fold it into the Android brand, this person says.

Having its software power a bevy of home gadgets would give Google valuable insight into people’s behaviors and habits.

Devices running the new Brillo software would be able communicate with devices made by Google’s Nest unit, which include a thermostat and smoke detector. Those have operating systems built using Linux software, and the thermostat is loaded with technology called Thread that could enable it to serve as a hub for communicating with a range of other devices.

Undoubtedly, Google also wants to head off efforts by Microsoft and Samsung Electronics to create similar software and hardware standards for connected devices.

Microsoft has announced a slimmed down version of Windows 10 that runs on a Raspberry Pi, a cheap microcomputer popular among device developers.

Samsung has Artik, a set of standardized circuit boards smart home developers can tap. It also bought SmartThings, which makes a $99 wireless hub and a free app to control compatible devices around the home. But developers have been reluctant to commit to the system because it depends on Samsung’s as-yet unproved ability build up a huge installed base of hubs.

Construct a Website That Builds Business-Automation Integrators Lag

Construct a Website That Builds Business-Automation Integrators Lag

Jon DiPietroAuthentia has published a comprehensive study of the control system integrator industry’s digital marketing performance. You can find additional information on the author’s blog. Many industrial/manufacturing industries lag behind in their adoption of modern digital marketing practices, largely due to target demographics that have been slow to embrace social media and mobile computing. This has especially been the case in the control system integrator industry. However, with digital trends accelerating and workforce demographics rapidly changing, businesses are being forced to adapt quickly.

[Disclaimer: I have a relationship with Authentia; I also hired it to construct a Website for Maintenance Technology magazine; Jon DiPietro built this site for me two years ago. Obviously, I like their work.]

Authentia randomly selected 100 North American control system integrators and assessed their digital marketing effectiveness against 32 separate criteria. The results indicate areas of opportunity for control system integrators to take advantage of industry-wide latencies. Owners, business developers, and marketing professionals will find this information valuable in assessing their own efforts and opportunities against their peers and competitors.

“With my background in industrial controls and leadership positions in the International Society of Automation (ISA), control system integrators are near and dear to my heart,” said Authentia Strategic Marketing Consultant Jon DiPietro. “I have many friends and colleagues who work in that industry. Over the past few years, I’ve conducted dozens of digital marketing assessments for control system integrators and other automation companies. I thought it would be interesting to conduct an industry-wide assessment and see how the industry as a whole is adapting to digital marketing trends.”

Key findings from the report include:

Websites are outdated in terms of messaging and technology:

  • 79% of CSI websites we analyzed make site visits from a mobile device difficult or impossible, alienating nearly half of their web visitors.
  • 48% of the website cannot easily change site content or even enable blogging, as they do not use a Content Management System (CMS).
  • 45% of all sites studied make no attempt to establish trust with site visitors through the use of social proof, such as testimonials, awards, certifications, memberships, etc.

Search engine marketing is nearly non-existent in the industry:

  • 3% of websites surveyed were determined to be paying for advertisements on search engines.
  • 85% of CSI websites had a Domain Authority below 40, which is a measure of how much clout a website carries with search engines.
  • 42% of websites did not have any analytics operating which track their performance.

The industry has not yet adopted content marketing as a strategy:

  • 67% of those studied do not list or promote social media accounts, such as Facebook or LinkedIn
  • 65% of websites have no blog or news feed.
  • 12% had a blog and published industry-focused content (as opposed to company news).
  • 88% of websites surveyed did not incorporate social sharing buttons, making their content difficult to find and share.

There are very few mechanisms in place to interact with prospects:

  • 2% of websites were connected to a marketing automation tool.
  • 84% of websites surveyed did not utilize visible call-to-action buttons.
  • 95% of websites failed to use landing pages, which contain an offer designed to collect information from prospects.

The 2015 Control System Integrator Digital Marketing Benchmark Report can be downloaded for free at www.authentiasoft.com/2015-csi.

End Note

I just went through my list of RSS feeds for blogs and Website changes that I’ve accumulated over the past several years. No fewer than 20 of them had not been updated for two years. I could not believe the number of companies who started a very good information and content system, and then they just bailed out on it. When I think of the lost opportunities for these companies, I just shudder.

Construct a Website That Builds Business-Automation Integrators Lag

Construct a Website That Builds Business-Automation Integrators Lag

Jon DiPietroAuthentia has published a comprehensive study of the control system integrator industry’s digital marketing performance. You can find additional information on the author’s blog. Many industrial/manufacturing industries lag behind in their adoption of modern digital marketing practices, largely due to target demographics that have been slow to embrace social media and mobile computing. This has especially been the case in the control system integrator industry. However, with digital trends accelerating and workforce demographics rapidly changing, businesses are being forced to adapt quickly.

[Disclaimer: I have a relationship with Authentia; I also hired it to construct a Website for Maintenance Technology magazine; Jon DiPietro built this site for me two years ago. Obviously, I like their work.]

Authentia randomly selected 100 North American control system integrators and assessed their digital marketing effectiveness against 32 separate criteria. The results indicate areas of opportunity for control system integrators to take advantage of industry-wide latencies. Owners, business developers, and marketing professionals will find this information valuable in assessing their own efforts and opportunities against their peers and competitors.

“With my background in industrial controls and leadership positions in the International Society of Automation (ISA), control system integrators are near and dear to my heart,” said Authentia Strategic Marketing Consultant Jon DiPietro. “I have many friends and colleagues who work in that industry. Over the past few years, I’ve conducted dozens of digital marketing assessments for control system integrators and other automation companies. I thought it would be interesting to conduct an industry-wide assessment and see how the industry as a whole is adapting to digital marketing trends.”

Key findings from the report include:

Websites are outdated in terms of messaging and technology:

  • 79% of CSI websites we analyzed make site visits from a mobile device difficult or impossible, alienating nearly half of their web visitors.
  • 48% of the website cannot easily change site content or even enable blogging, as they do not use a Content Management System (CMS).
  • 45% of all sites studied make no attempt to establish trust with site visitors through the use of social proof, such as testimonials, awards, certifications, memberships, etc.

Search engine marketing is nearly non-existent in the industry:

  • 3% of websites surveyed were determined to be paying for advertisements on search engines.
  • 85% of CSI websites had a Domain Authority below 40, which is a measure of how much clout a website carries with search engines.
  • 42% of websites did not have any analytics operating which track their performance.

The industry has not yet adopted content marketing as a strategy:

  • 67% of those studied do not list or promote social media accounts, such as Facebook or LinkedIn
  • 65% of websites have no blog or news feed.
  • 12% had a blog and published industry-focused content (as opposed to company news).
  • 88% of websites surveyed did not incorporate social sharing buttons, making their content difficult to find and share.

There are very few mechanisms in place to interact with prospects:

  • 2% of websites were connected to a marketing automation tool.
  • 84% of websites surveyed did not utilize visible call-to-action buttons.
  • 95% of websites failed to use landing pages, which contain an offer designed to collect information from prospects.

The 2015 Control System Integrator Digital Marketing Benchmark Report can be downloaded for free at www.authentiasoft.com/2015-csi.

End Note

I just went through my list of RSS feeds for blogs and Website changes that I’ve accumulated over the past several years. No fewer than 20 of them had not been updated for two years. I could not believe the number of companies who started a very good information and content system, and then they just bailed out on it. When I think of the lost opportunities for these companies, I just shudder.

Follow this blog

Get a weekly email of all new posts.