Cyber Security First Step for Introducing IIoT to the Factory
IoT technology is used for various purposes in the industries. It is used for visualizing operating state of production facilities and predicting failure. Data is collected using IoT devices, analized, and used for automatic control. While Industrial IoT(IIoT) allows efficient production, devices connected to the network have new threats such as cyber attack. Cyber attack on IIoT devices may affect not only the production, but also the business partners and entire supply chain. JPCERT/CC released "Cyber Security First Step for Introducing IIoT to the Factory" to assist implementing security measures for such threats.
The purpose of this document is to provide basic guide to cyber security for introducing IIoT devices to a factory, especially for Small and medium-sized business. Audience of this document are business owners, factory managers, system administrators, and factory engineers.
For the business owners, this document describes the concept of the IIoT security and recommended security measures. For factory managers, system administrators, and factory engineers, this document describes recommended security measures for when purchasing IIoT devices and constructing IIoT network.
For such conventional attack methods, limited set of tools are used in many different incidents. The many points that need to be investigated can be dealt with quickly and systematically by understanding typical tools often used by such attackers, and what kind of and where evidence is left.
-P.5 For Business Owners and Managers
-P.7 IIoT Cyber Security Approach
[For factory managers and engineers]
-P.9 IoT Installation Process: Roles and Responsibility of Third-Party Vendors
-P.13 Elements of IIoT: Cyber Security Navigation Map"
-Contacts-
JPCERT/CC ICS Security Response Group
Please fill in the contact form (For IE) (For other browsers) and e-mail to icsr@jpcert.or.jp
Date | Title | |
---|---|---|
2019-04-23 | Cyber Security First Step for Introducing IIoT to the Factory -Security Guide for Businesses Implementing IIoT- |
PDF Signature 1.16MB |