Development Process Safe and Secure with PILZ

MC PILZ DEvelopment Process Safe and Secure 1 400

April 27, 2022

 

TUV Sud scrutinized PILZ’s development processes. The result of this audit: PILZ’s development met the requirements of the standard IEC 62443-4-1 and complies with the SDL process. The international series of standards IEC 62443 “Industrial communication networks – Network and system security” deals with IT security in automation.

The range of topics spans from risk analysis, to requirements for safe operation and the secure development of products (security by design). As a result, IEC 62443 currently offers the best orientation guide for plant operators and device manufacturers when it comes to implementing security effectively.

It looks at five areas: the basic industrial security requirements, the principle of zones and conduits, the security levels, the security lifecycle and the risk analysis.

Product development is doubly safe, meeting the standard for industrial security

We are safety experts. It’s important to us that our products are not only safe, but also secure. That’s why we commissioned TÜV Süd to scrutinise our development processes and test them on the basis of the standard IEC 62443-4-1, which defines secure product development, the “Security Development Lifecycle Process” (SDL process). This approach examines potential security features, even as a new product is being designed. It is intended to ensure that all of a product’s security risks are detected by modelling the threats and, ideally, rectifying them in the product during the development process.

The result of this audit: Pilz’s development met the requirements of the standard and complies with the SDL process. As a result we can say with certainty: Pilz’s development is not only safe, but also secure!
According to TÜV Süd, the development of secure products in accordance with IEC 62443-4-1 is taken very seriously at Pilz and creates a solid basis for subsequent product certifications.

Basic industrial security requirements

The basic security requirements (foundational requirements) include:

  • •Identification and authentication
  • •Use control
  • •System integrity
  • •Data confidentiality
  • •Restricted data flow
  • •Timely response to events
  • •Resource availability

MC PILZ DEvelopment Process Safe and Secure 4 400

For each of these foundational requirements further system requirements are defined, which can be used as a basis for the implementation of security measures.

Security level

Security levels define the security level that plant operators or manufacturers want to achieve using security measures. Information is provided by a prior risk assessment. This defines what is to be protected and determines the probability of this asset being attacked. The security level (SL) is selected accordingly. SL-2, that is protection against “intentional violation using simple means with low resources, generic skills and low motivation” should be seen as a minimum standard today.

To keep this minimum standard, the company needs a specific security maturity level. The best firewall is useless if a company’s employees continue to write their passwords on post-it notes and stick them on their PC screens or if they do not run updates. The more the company is involved in security as an issue, the higher the overall protection will be. Therefore an overall security concept is important. The application firewall SecurityBridge can contribute to a high security level as part of an overall concept.

The security levels at a glance:

Security Level 1: Protection against casual or coincidental violation
Security Level 2: Protection against intentional violation using simple means.
Security Level 3: Protection against intentional violation using sophisticated means
Security Level 4: Protection against intentional violation using sophisticated means with extended resources

 

Industrial security risk assessment

The security development process is an expansion of the general product development process. One basic aspect of a standard-compliant development process (in accordance with IEC 62443-4-1 – Secure product development lifecycle requirements) is to perform a risk assessment. It reveals the dangers and risks that a product is subjected to from “cyber space” and the measures to take to minimise them.

MC PILZ DEvelopment Process Safe and Secure 3 400

The security risk assessment should always be performed in the following 6 steps:

  1. Identify assets: What do I want to protect?
  2. Analyse threats: What are the risks on the asset I want to protect?
  3. Determine relevant protection objectives: What objectives do I want to achieve?
  4. Analyse and assess risks: How likely is it that a risk will occur?
  5. Select and implement protective measures: How can I protect from possible risks?
  6. Resilience management: What to do after an attack? How can I anchor the idea of security more firmly in the company?

 

Industrial security lifecycle

Security is a “moving target”, that is, security changes during a product’s lifecycle. Attackers develop increasingly better methods to overcome defence measures, so defence measures against cyber threats have to be improved continuously. The responsibility for this lies primarily with plant operators. An effective security strategy can increase the service life of your plant. Machine builders and component manufacturers should immediately inform the operators about new security problems. You must provide updates for your device’s software to enable customers to remedy any weaknesses. If system integrators are involved in the process, they act as an intermediary between manufacturer and operator. It is important that everyone involved works in close collaboration throughout the entire product lifecycle. Only this will result in a high degree of protection.

MC PILZ DEvelopment Process Safe and Secure 2 400

 

 

 

To learn more about Security 4.0 from PILZ, click here 

 

Source

 

 

Related Articles

  • Humber College Receives $30 Million Gift from the Barrett Family Foundation

    Humber College Receives $30 Million Gift from the Barrett Family Foundation

    January 27, 2023 Humber College is the recipient of a $30 million gift from the Barrett Family Foundation, marking the largest single donation made to an Ontario college. Combined with their donations to Humber’s Unlimited Campaign, the Barrett Family Foundation has given a total of $42 million, making their donation the largest in Canadian college history…. Read More…


Latest Articles

  • Rotary Encoders for Harsh Environments

    January 30, 2023 Rotary encoders are electromechanical devices that provide feedback on the rotational movement of an axle or shaft. Comprising two parts – a reader and a scale – they typically accomplish this task either by either “absolute encoding” or “incremental encoding”: Absolute encoders measure the precise angular position of the reader relative to… Read More…

  • Energy Technology Perspectives 2023

    Energy Technology Perspectives 2023

    Energy Technology Perspectives 2023 highlights major market and employment opportunities, as well as the emerging risks, for countries racing to lead the clean energy industries of today and tomorrow. The energy world is at the dawn of a new industrial age – the age of clean energy technology manufacturing – that is creating major new markets and millions of jobs but also raising new risks, prompting countries across the globe to devise industrial strategies to secure their place in the new global energy economy, according to a major new IEA report. Read More…


Featured Article

Access Management for Your Plant and Machinery

With PILZ’s “Identification and Access Management” portfolio, they offer you a comprehensive range of products, solutions and software for the implementation of safety as well as security tasks. Below you’ll discover more about potential applications, from simple authentication to complex access permissions, and access management through to safe operating mode selection, maintenance safeguarding and safeguarding of data and networks. Experience safety and security in one system!

This solution ensures that a machine cannot resume operation while people are still in the danger zone. The maintenance safeguarding system “key-in-pocket” is designed for machines with danger zones, which are protected by a safety fence and which staff need to access – robot cells for example. In comparison with conventional lockout-tagout (LOTO) systems, maintenance safeguarding with the key-in-pocket solution is implemented via RFID keys with corresponding permissions and a safe list in the PILZ controllers. As a result, it provides a purely electronic restart protection and makes both mechanical interlocking devices and warning tags redundant.

Read more


Products

  • The One Stop Shop for Industrial Sensors

    January 30, 2023 POSITAL understands how frustrating and costly it can be when your operations are standing still because of a broken encoder. They are here to help! The new webshop of POSITAL aims to make it easier for purchasers or MRO customers to get the parts they need to keep their machines running and… Read More…

  • New Schmalz End-of-Arm Tooling Components from AutomationDirect

    January 30, 2023 AutomationDirect now offers end-of-arm tooling components for robot arm vacuum pick-and-place applications. Components can be purchased individually or in kits that include everything needed to create a single-beam or dual-beam end-of-arm tool. End-of-arm tooling components for vacuum pick-and-place systems are used to create tooling that connects to the end of a robot… Read More…