Featured Image

OT Networks Face Security Threats From All Points on the Compass

Jan 06, 2022

A common way many companies think about protecting their manufacturing network is to isolate the OT (manufacturing shop floor) network from the balance of their business network (IT). Regardless of whether or not there is a single or multiple points of connection between the two network environments, the objective of the security functions applied at these connection points is to control the flow of information across that barrier and to block security threats from propagating across that boundary. The flow of information across that boundary is often referred to as “north-south” communications. More commonly, north-south communications defines the transfer of information between “high level” systems and “lower level” systems. An example of this in an OT network would be the communications between a data collection system (higher level system) and individual pieces of equipment on the shop floor (lower level systems). North-south communications can represent the flow of information across the IT/OT boundary or amongst various systems within the OT network.

Implementing security functions in support of north-south communications in the OT environment is more challenging than what is encountered in the IT environment. The OT environment doesn’t have the luxury of most devices sharing common capabilities and communications standards (protocols or languages). While most devices on the shop floor can be connected to an Ethernet network, many of these devices use their own unique languages (protocols) for communicating over the network. Traditional network security tools are effective at addressing the basic Ethernet portion of the communications but generally do not have the ability to analyze the content of the messages being passed between systems. Security threats encapsulated within these messages can pass between systems undetected. Security tools for the OT environment have not yet progressed to the point of being able to address each of the unique protocols found in the manufacturing environment. 

While the security measures deployed on most OT implementations focus primarily on north-south communications, there is another aspect of communication on the shop floor that is equally important – east-west communications. East-west communications is the exchange of information between similar systems – device to device. A common threat scenario encountered in the OT environment occurs when a virus, malware, or other security threat is introduced into a piece of equipment and then spreads to other pieces of equipment. The introduction of this threat is typically unintended but can originate from maintenance equipment, test equipment, or hardware/software upgrades to a piece of equipment. Once introduced, the threat can then propagate to other equipment within the same network segment. 

Implementing security functions to address east-west communications is very difficult in most OT environments. To implement such security measures, security software must be installed at each device. While some shop floor systems incorporate PC functions that can host security software, most do not. Edge computing devices are effective for implementing security functions. However, adding edge computing devices to every piece of equipment can be cost prohibitive. The most common scenario implemented today is to segregate an OT network into logical groupings of equipment. With this scenario, security functions are implemented to protect against propagation of security threats between network segments, but each piece of equipment within the segment is left exposed to those threats that are propagated through east-west communications.

Many companies that have implemented very extensive north-south security measures have suffered significant impacts from security threats that propagated through east-west communications. The impact of these “attacks” can be significant – lost production and potential damage to equipment. 

Cybersecurity threats to manufacturing operations will likely never go away and are, in fact, increasing in number and complexity. Manufacturers and the companies supplying equipment for use on the manufacturing shop floor need to come together to define improved solutions to address security threats to manufacturing operations. These improvements need to address implementing security functions at the device level. This goes well beyond today’s approaches of network isolation and/or network segmentation. This goes to the level of protecting each device at the device level.

PicturePicture
Author
John Turner
Director of Technology for FA Consulting & Technology (FAC&T) and member of the MTConnect Institute.
Recent technology News
We celebrate all kinds of manufacturing at AMT – The Association For Manufacturing Technology, from the most cutting-edge smart automation to the humble, time-honored shuttle loom. Few things thread the needle between tradition and tech quite like denim.
Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.
New technology is a growth engine for manufacturing, but change risks disruption and enormous costs. Incrementally rolling out new equipment and software using technology testbeds helps refine and optimize processes before production deployment.
Check in for the highlights, headlines, and hijinks that matter to manufacturing. These lean news items keep you updated on the latest developments.
Successfully implementing edge computing into your shop floor may be more cost efficient than you think! Here are a couple ways your shop (and budget) can benefit. Bonus: Edge computing devices can also bolster your cybersecurity measures, saving you more!
Similar News
undefined
Intelligence
By Catherine “Cat” Ross | Jun 03, 2025

DN Solutions' new tech center. Trumpf’s smart factory launch. Six new AMT members. Updates from Hexagon, Kennametal, Nikon, United Grinding, Michigan Tech, MIT, and more. Explore the latest in facilities, partnerships, leadership changes, and R&D news.

5 min
undefined
Intelligence
By Christopher Chidzik | Jun 06, 2025

In the midst of the recession caused by the 2008 financial crisis, orders for metalworking machinery totaled around $95 million in Jan. 2009, the lowest level recorded. Although orders grew scarcer, businesses continued to invest in manufacturing tech.

5 min
undefined
Technology
By Stephen LaMarca | Jun 05, 2025

We celebrate all kinds of manufacturing at AMT – The Association For Manufacturing Technology, from the most cutting-edge smart automation to the humble, time-honored shuttle loom. Few things thread the needle between tradition and tech quite like denim.

5 min