ProSoft Insights / White papers

IIoT Deployment and Legacy Equipment

Search Insights

Categories

Tags

Subscribe

Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at www.prosoft-technology.com/privacy. ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Putting together a remote access network really can be this quick

06 Aug, 2020 / Videos

Remote connectivity can keep your employees safe, help you decrease downtime, and cut y...

Wireless I/O: No Trenching, No Permits, No Conduit. No Problem.

30 Jul, 2020 / Work Smarter

With Wireless I/O solutions, you can avoid the permits, trenching, and conduit that are...

Need to Replace Your Molex® SST™ Module?

15 Jul, 2020 / Products focus

With some Molex® SST™ products being moved to the obsolete column, your best approach m...

Streamlined Migrations for Legacy Products

09 Jul, 2020 / Products focus

New modules and updated features will help you replace your legacy units, and bring gre...

IIoT Deployment and Legacy Equipment

Secure Products - Dealing with Legacy Equipment

The first key concept in IIoT deployment involves securing systems. Product lifecycle has a huge impact on security in industrial applications. Unlike IT environments, products can remain in active service in industrial control systems for as long as 30 years. It is unrealistic to assume that end users will update older components when implementing IIoT. Thus, IIoT systems will include legacy end devices that were developed prior to advent of security standards alongside new end devices with native security features.

Let’s begin by looking at the challenges posed by legacy devices. Most industrial installations contain equipment that is antiquated from IT and security perspectives. Legacy equipment is at greater risk of attack than equipment with the latest versions of security features. There are two options available to mitigate this issue, with their selection driven by the application.

 1. Limit communication to data collection only. This is the safest option but may not be viable for all applications.
 2. Placing restrictions on device access. Note that this will require monitoring of the integrity of communications to ensure that data is not changed as it travels between devices. This option is more practical as limiting access to data collection is not feasible for many applications.

Devices that have been recently deployed will have security features.  In this case you may be able to operate without building security around devices.

 

Considerations when Purchasing Equipment

If customers choose to update legacy equipment, selecting equipment with firmware and software signing is critical to ensure secure patching. You should also lean toward products developed using a secure development lifecycle. Most organizations have a well-defined process to create, release, and maintain products. However, increasing concerns and business risks associated with insecure products have brought increased attention to the need to integrate security into the development process. You should ask potential vendors to supply proof that development centers have been certified to standards such as IEC 62443-4-1. Third-party certification of a development process can provide confidence that products were developed using secure practices, reducing potential implementation risk.

 

Conclusion

Connecting devices to each other and the cloud opens the door for an intelligent process, potentially leading to significant improvements in productivity and efficiency. The tools to successfully implement the IIoT are in place today, but change will be evolutionary vs. revolutionary. End users will weigh the value of new functionality against the risk of making changes to their control system which will impede rapid change. Security will be a key factor impacting success. System design, product features, secure development processes, and implementation expertise will have to be taken into consideration when implementing the IIoT.

 

For more insights on planning a successful IIoT deployment, check out last month’s blog post “Security: The Key to Successful IIoT Deployments” here: http://psft.com/B4Q

About the Author: Fabrice Jadot first joined Schneider Electric in 1997, focusing on motor control within R&D as part of the variable speed drives activity, which became a joint venture with Toshiba in 2000 named Schneider Toshiba Inverter. In 2012, he joined the corporate side of the company as the Strategy and Innovation Platforms VP, dealing with cross-business technology platforms in the domain of digital services, supervisory control, and embedded control. Today, he is the Chief Technology Officer for Industry business driving automation system architecture, cybersecurity, and automation digital transformation (Industrial Internet of Things, Industry 4.0, etc.). In 2015, he became a board member of ODVA, an international association comprised of members from the world's leading automation companies. He enjoys traveling, especially visiting historical sites and architectures, along with wine tasting and walking. 

Source: http://blog.schneider-electric.com/