
With high-profile cyberattacks growing in frequency, industry has become all too aware of the potential dark side of internet-connected devices. While plant-floor networks were once air-gapped to separate them from enterprise networks, this approach has become untenable, as the core functionality of Industry 4.0 and Internet of Things (IoT) initiatives are built on integration between operational technology (OT) and information technology (IT).
As a result, defense-in-depth strategies have grown in popularity. These approaches seek to use intentional redundancies at every layer of a system down to the device level to ensure security.
To help operators achieve this, Rockwell Automation has released the Allen-Bradley Common Industrial Protocol (CIP) Security Proxy, which aims to allow end-users to more easily retrofit their systems to be compatible with CIP security methodologies.
CIP security works by initiating a transport layer security (TLS) “handshake” whenever a new device is added to a network. Before any communication is established, the TLS handshake checks to guarantee that the device being added possesses a security certificate that must be embedded in the device by the vendor. Once the identity of the device is established, encryption keys are created and exchanged, which allow the devices to communicate cryptographically, effectively baking security into the communications themselves. This ensures that communications are authentic, that they have not been altered by an outside party, and that they remain private.
Similar techniques have been used to ensure safe and confidential network communication in the IT world for many years, but it is the increased need for device-level security in industrial environments that has brought it to the plant floor.
However, some legacy systems and equipment may not have native support for CIP security, due to lacking hardware and firmware. To remedy this, Rockwell’s CIP Security Proxy can be connected to any EtherNet/IP-compliant device, granting it a security certificate and allowing it to engage in encrypted communication with higher-level systems.
The proxy device contains three gigabit EtherNet/IP ports, and can be configured through Rockwell’s FactoryTalk Policy Manager software and FactoryTalk system services. In addition, it supports motion for Kinetix drives and offers a web server for viewing diagnostics.
Source of this news: https://www.automationworld.com/cybersecurity/article/21577110/rockwell-automation-cip-security-proxy
Related posts:
How to choose the best VPN for streaming outside US – Film Daily ☽ Trending News September 4, 2021 by: Frankie S...
VPNs are designed to encrypt and obfuscate a user’s activity over the internet. They are useful for avoiding targeted marketing, bypassing regional content blocking, and establishing a secure connect...
Second Quarter 2021 Net Revenues Increased 35% to $97 Million Year-Over-Year with Adjusted EBITDA Up 28% Year-Over-Year Company Reaffirms Revenue and Adjusted EBITDA Growth Trajectory for Full Year 2...
If you see a lot of banner ads on certain websites, you know that without a Virtual Private Network (VPN), hackers will quickly ravage your computer and burn down your house. Well, that seems to be w...
Netflix has a lot of libraries to offer but, there is only one problem – the library varies from country to country. Netflix content differs based on regions and so do prices. So how can we access US...
Rumors of a Half-Life 2 remaster and a God of War PC plug-in started spreading on Saturday after the contents of an -nvidia database leaked. Don’t achieve too excited, though: Nvidia says the ...
The quote says that Patience is a virtue. In the online world, however, it’s all about the speed. And if you’ve been on a page for more than you should have been, it’s definitely not fun. But don’t w...
Note: These steps are only necessary if you want to use an external browser for manual testing with Burp. If you prefer, you can just use Burp's embedded browser, which is preconfigured to work wit...
Story Highlights Quantum CatDV 2021 Platform Update is currently available with major new features, performance enhancements, and a range of new deployment options to address the needs of agile ...
Text-based content is provided for educational moreover informational purposes only and it's not intended and should not possible be construed as legal advice. This can sound like qualify as "At...
Our tutorial is about the It is possible to Fix ‘Error code 0x803F8001’ on Windows Store. I will try our best so that you understand this handbook. I hope you like this blog How to Cook ‘Error ...
On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Server 2.4.49 and 2.4.50 tracked as CVE-2021-41773 and...
Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously unrecognized Linux malware that's engineered to enable remote access to i...
To receive service, our phones reveal personal identifiers to cell towers owned by major network operators. This has led to vast and largely unregulated data-harvesting industries. Now, researchers h...
Note: 18 rotations were planned for 2020, but five were cancelled due to COVID-19. WASHINGTON: The Army has cancelled a National Guard brigade’s planned deployment to Combat Training Center wargames ...
Mining for cryptocurrency enables you to produce money by devoting your computer’s processing power to cryptographic issues. Miners authorize transactions and safeguard the underlying bloc...
A mind-blowing view of the Sustainability Pavilion at the Expo 2020 site in Dubai. wam Inayat-ur-Rahman, Business EditorThe Expo 2020 Dubai set to be the most digitally-connected and immersive e...
On Saturday evening, KrebsOnSecurity was the person of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The breach came from “ Meris , ” the same newer botnet be...