Automation / Innovation

Cyber-Security Guidelines for Industrial Ethernet

December 6, 2011
/ Print / Reprints /
ShareMore
/ Text Size+
As manufacturers increase connectivity between plant floor and enterprise systems to boost productivity and reduce time to market, this interconnectivity can also
Securing EtherNet Networks
Securing Ethernet/IP Networks is a free document that provides a starting point in thinking about cyber-security. Source: ODVA.

bring undesirable security risks. ODVA (Open Device-Net Vendors Association) released a document that provides guidelines on how to minimize these risks. Entitled Securing EtherNet/IP Networks, the 22-page document discusses cyber-security recommendations for automation networks, including how to determine and deploy security strategies for various network types. The document is freely available for downloading.
In the guidelines, ODVA outlines key security concerns in industrial automation and provides guidance and resources for process changes to mitigate risk, including information on:

  • Risk analysis
  • Collaboration between IT and industrial departments
  • Best practices for different types of industrial networks
  • Emerging industrial security technologies.

“In the past, manufacturers were able to secure industrial control systems simply by controlling physical access to their automation components,” says Katherine Voss, executive director, ODVA. “Today’s demand for increased productivity requires interconnectivity through industrial Ethernet—most often EtherNet/IP, as it provides unprecedented visibility into real-time machine and supervisory systems. As many businesses are concerned about the security risks that come from a free flow of information, ODVA outlines how to manage risks with the implementation of processes and technology.”

ODVA recognizes the complexity manufacturers face when trying to identify and contain security issues in their businesses, and does not attempt to provide an exhaustive list of security risks, precautions or mitigation steps. Rather, this document aims to provide users with a starting point for thinking about what cyber-security means for industrial networks and what a security strategy looks like, in addition to directing readers to additional resources and information.

Download Securing EtherNet/IP Networks

Did you enjoy this article? Click here to subscribe to Food Engineering Magazine.

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

Fabulous Food Plant: Paramount Citrus

Learn more about this fabulous food plant in Food Engineering's article, found here.

Podcasts

Burns & McDonnell project manager RJ Hope and senior project engineer Justin Hamilton discuss the distinctions between Food Safety and Food Defense as well as the implications for food manufacturers of the Food Safety Modernization Act.
More Podcasts

THE MAGAZINE

Food Engineering Magazine

Food engineering magazine 2014 april cover

2014 April

Catch a preview of the Powder and Bulk Show in this April 2014 edition of Food Engineering. Also, be sure to check out a coffee stick making a real stir and a major advancement in the the pet food industry.
Table Of Contents Subscribe

THE FOOD ENGINEERING STORE

Food-Authentication-Flyer-(.gif
Food Authentication Using Bioorganic Molecules

This text provides critical tools and data needed to augment routine food analysis and enhance food safety by aiding in the detection of counterfeit, and potentially deleterious, foods.

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Food Master

Food Master Cover 2014Food Master 2014 is now available!

 

Where the buying process begins in the food and beverage manufacturing market. 

Visit www.foodmaster.com to learn more.

STAY CONNECTED

FE recent tweets

facebook_40.pngtwitter_40px.pngyoutube_40px.pnglinkedin_40px.png