{"id":4063,"date":"2025-11-06T11:30:19","date_gmt":"2025-11-06T10:30:19","guid":{"rendered":"https:\/\/pilz-magazine.com\/de\/?p=4063"},"modified":"2025-11-06T15:05:02","modified_gmt":"2025-11-06T14:05:02","slug":"cybersecurity-machineryregulation-cra-nis2","status":"publish","type":"post","link":"https:\/\/pilz-magazine.com\/en\/cybersecurity-machineryregulation-cra-nis2\/","title":{"rendered":"IT vs. OT: two worlds, one goal"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">The number of cyber attacks on companies is increasing. What is the first step towards greater protection against such attacks?<\/h5>\n\n\n\n<p><strong>Matthias Kuczera:<\/strong>&nbsp;Cyber\u00adse\u00adcu\u00adrity dis\u00adtin\u00adguishes between IT and OT Secu\u00adrity. IT con\u00adcerns office com\u00admu\u00adni\u00adca\u00adtion, whereas OT con\u00adcerns the phys\u00adical processes in pro\u00adduc\u00adtion. Our prod\u00aducts and ser\u00advices are spe\u00adcialised for OT Secu\u00adrity. Com\u00adpa\u00adnies should first of all check whether they are affected by cur\u00adrent legal require\u00adments such as the Cyber Resilience Act, the NIS 2 Direc\u00adtive or the new Machinery Reg\u00adu\u00adla\u00adtion, and if so to what extent. Because leg\u00adis\u00adla\u00adtors have also recog\u00adnised that Secu\u00adrity is highly rel\u00ade\u00advant. An ini\u00adtial risk analysis is essen\u00adtial: what is worth pro\u00adtecting? What could happen? Which mea\u00adsures are appro\u00adpriate? And: What to do in an emer\u00adgency?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CRA, NIS 2 and MR: What awaits machine manufacturers and operators?<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">Simon, how does the subject of cybersecurity present itself when you are talking to customers in the field?<\/h5>\n\n\n\n<p><strong>Simon Nutz:&nbsp;<\/strong>Most people know that they need to act, but many are unsure about what exactly is required. We do a lot of edu\u00adca\u00adtional work and explain to cus\u00adtomers what to expect: what needs to be imple\u00admented? What really affects the com\u00adpany? We start with the basics: what should be pro\u00adtected? What hap\u00adpens if a plant or OT in gen\u00aderal is attacked? On this basis we build appro\u00adpriate pro\u00adtec\u00adtion con\u00adcepts.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">What is the best possible way for machine manufacturers to prepare under the current conditions?<\/h5>\n\n\n\n<p><strong>Kuczera:&nbsp;<\/strong>Com\u00adpa\u00adnies actu\u00adally have a vested interest in pro\u00adtecting them\u00adselves against cyber attacks. The EU guide\u00adlines are merely intended to ensure that all com\u00adpa\u00adnies are ade\u00adquately pre\u00adpared.<\/p>\n\n\n\n<p>The CRA affects all prod\u00aducts with dig\u00adital ele\u00adments. From December 2027, these must meet a defined Secu\u00adrity level. Anyone who pur\u00adchases new machinery or IT infra\u00adstruc\u00adture must act in accor\u00addance with CRA. Man\u00adu\u00adfac\u00adturers who place their own prod\u00aducts on the market must comply with the rel\u00ade\u00advant processes. At Pilz, for example, we have a devel\u00adop\u00adment process cer\u00adti\u00adfied in accor\u00addance with IEC 62443\u20134\u20111, thereby ensuring that secure product devel\u00adop\u00adment life\u00adcycle require\u00adments are met.<\/p>\n\n\n\n<p><strong>Nutz:&nbsp;<\/strong>Anyone who fol\u00adlows IEC 62443 is already doing a lot of things right. Even if not all of the stan\u00addards are fully avail\u00adable yet, it is a solid foun\u00adda\u00adtion.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">What does the NIS&nbsp;2 Directive require?<\/h5>\n\n\n\n<p><strong>Nutz:&nbsp;<\/strong>NIS 2 is about enabling com\u00adpa\u00adnies to pre\u00adpare for a cyber threat sce\u00adnario. The NIS 2 Direc\u00adtive applies to com\u00adpa\u00adnies with over 50&nbsp;employees or an annual turnover of more than 10 mil\u00adlion Euro. These com\u00adpa\u00adnies must iden\u00adtify risks and take appro\u00adpriate mea\u00adsures: risk man\u00adage\u00adment, backup man\u00adage\u00adment and vul\u00adner\u00ada\u00adbility man\u00adage\u00adment. In future, attacks must be reported. This allows other com\u00adpa\u00adnies to quickly check whether they are also affected.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-medium is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"288\" src=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Manuel-Kuczera-Portrait-1-300x288.jpg\" alt class=\"wp-image-4162\" srcset=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Manuel-Kuczera-Portrait-1-300x288.jpg 300w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Manuel-Kuczera-Portrait-1-768x737.jpg 768w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Manuel-Kuczera-Portrait-1-540x518.jpg 540w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Manuel-Kuczera-Portrait-1.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cThere\u2019s no Safety without Secu\u00adrity \u2013 that\u2019s the core mes\u00adsage of the Machinery Reg\u00adu\u00adla\u00adtion. Any Safety func\u00adtion can be com\u00adpro\u00admised and must be pro\u00adtected.\u201d<\/p>\n<cite>Matthias Kuczera, Stan\u00addards Group at Pilz<\/cite><\/blockquote>\n<\/div>\n\n\n\n<p><strong>Kuczera<\/strong>:&nbsp;An infor\u00adma\u00adtion secu\u00adrity man\u00adage\u00adment system in accor\u00addance with ISO 27001 is an ele\u00adgant way to meet the require\u00adments. Alter\u00adna\u00adtively there are infor\u00adma\u00adtion secu\u00adrity man\u00adage\u00adment sys\u00adtems such as TISAX (Trusted Infor\u00adma\u00adtion Secu\u00adrity Assess\u00adment Exchange). Each com\u00adpany must decide whether to go down this route or imple\u00adment other mea\u00adsures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security starts in the machine<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">The new Machinery Regulation stipulates that Security aspects must now also be taken into account when assessing Machinery Safety. What is the best approach for a machine manufacturer or operator?<\/h5>\n\n\n\n<p><strong>Kuczera:&nbsp;<\/strong>There\u2019s no Safety without Secu\u00adrity \u2013 that\u2019s the core mes\u00adsage of the Machinery Reg\u00adu\u00adla\u00adtion. It is now nec\u00ades\u00adsary to check whether a Safety func\u00adtion can be com\u00adpro\u00admised and must there\u00adfore be pro\u00adtected accord\u00adingly. Even though the MR does not take effect until 2027, it makes sense to imple\u00adment it now. Secu\u00adrity gaps actu\u00adally exist within the machine, i.e. in the OT. I need to know what my machine does and what the worst-case sce\u00adnario is if an unau\u00adtho\u00adrised person is in con\u00adtrol of it. Is the data con\u00adfi\u00adden\u00adtial? Is avail\u00adability cru\u00adcial? Then I analyse how an attacker might pro\u00adceed and how to secure the con\u00adtrol system. Because this con\u00adtrols the plant and must not be exposed on the Internet without pro\u00adtec\u00adtion. Misuse due to oper\u00adating errors also need to be con\u00adsid\u00adered. Close com\u00admu\u00adni\u00adca\u00adtion between man\u00adu\u00adfac\u00adturer and oper\u00adator is impor\u00adtant. Only the oper\u00adator knows the actual risk in their appli\u00adca\u00adtion.<\/p>\n\n\n\n<div class=\"wp-block-group mgznkr-elements mgznkr-box is-layout-flow wp-block-group-is-layout-flow\">\n<h4 class=\"wp-block-heading\">Pilz Podcast #43 || OT Security is coming \u2013 but how do I deal with it?<\/h4>\n\n\n\n<div class=\"embed-privacy-container is-disabled embed-spotify\" data-embed-id=\"oembed_e763c6cd88fb244f5326721a8d33442d\" data-embed-provider=\"spotify\" style=\"aspect-ratio: 800\/300;\">\t\t\t\t\t\t<button type=\"button\" class=\"embed-privacy-enable screen-reader-text\">Display content from Spotify<\/button>\t\t\t\t\t\t<div class=\"embed-privacy-overlay\">\t\t\t\t<div class=\"embed-privacy-inner\">\t\t\t\t\t<div class=\"embed-privacy-logo\" style=\"background-image: url(https:\/\/pilz-magazine.com\/en\/wp-content\/plugins\/embed-privacy\/assets\/images\/embed-spotify.png?ver=1769068825);\"><\/div>\t\t<p>\t\tClick here to view the con\u00adtent from Spo\u00adtify.\t\t\t\t\t\t\t\t\t\t<br>\t\t\t\t\tLearn more in <a href=\"https:\/\/www.spotify.com\/privacy\/\" target=\"_blank\">Spotify\u2019s pri\u00advacy policy<\/a>.\t\t<\/p>\t\t<p class=\"embed-privacy-input-wrapper\">\t\t\t<input id=\"embed-privacy-store-spotify-e763c6cd88fb244f5326721a8d33442d\" type=\"checkbox\" value=\"1\" class=\"embed-privacy-input\" data-embed-provider=\"spotify\">\t\t\t<label for=\"embed-privacy-store-spotify-e763c6cd88fb244f5326721a8d33442d\" class=\"embed-privacy-label\" data-embed-provider=\"spotify\">\t\t\t\tAlways dis\u00adplay con\u00adtent from Spo\u00adtify\t\t\t<\/label>\t\t<\/p>\t\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<div class=\"embed-privacy-footer\"><span class=\"embed-privacy-url\"><a href=\"https:\/\/open.spotify.com\/embed\/episode\/2pG0LBd44QIXaJirTHxyTt?si=81f7cd6d2eaa4227\">Open Spo\u00adtify directly<\/a><\/span><\/div>\t\t\t<\/div>\t\t\t\t\t\t<div class=\"embed-privacy-content\">\t\t\t\t<script>var _oembed_e763c6cd88fb244f5326721a8d33442d = '{\\\"embed\\\":\\\"&lt;iframe data-testid=&quot;embed-iframe&quot; style=&quot;border-radius:12px&quot; src=&quot;https:\\\\\/\\\\\/open.spotify.com\\\\\/embed\\\\\/episode\\\\\/2pG0LBd44QIXaJirTHxyTt?si=81f7cd6d2eaa4227&quot; width=&quot;100%&quot; height=&quot;300&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;&quot; allow=&quot;autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture&quot; loading=&quot;lazy&quot;&gt;&lt;\\\\\/iframe&gt;\\\"}';<\/script>\t\t\t<\/div>\t\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Industrial Security Consulting from Pilz<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">How does Pilz work with its customers to create an appropriate Safety concept, including Security?<\/h5>\n\n\n\n<p><strong>Nutz:&nbsp;<\/strong>We start with a pro\u00adtec\u00adtion require\u00adments analysis: is it about avail\u00adability, func\u00adtional safety or exper\u00adtise? This is fol\u00adlowed by a detailed risk assess\u00adment. We analyse all the assets, run through attack sce\u00adnarios and develop pro\u00adtec\u00adtive mea\u00adsures. Then we eval\u00aduate their effec\u00adtive\u00adness. The process is cyclical: what is secure today might be obso\u00adlete tomorrow. Our advan\u00adtage: we know the plants thanks to our safety exper\u00adtise and we are involved in devel\u00adoping the rel\u00ade\u00advant stan\u00addards, e.g. IEC 62443.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-medium is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz-300x300.jpg\" alt class=\"wp-image-4163\" srcset=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz-300x300.jpg 300w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz-150x150.jpg 150w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz-768x768.jpg 768w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz-540x540.jpg 540w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/11\/Pilz-Simon-Nutz.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWe know the plant\u2019s weak points and work with our cus\u00adtomers to develop effec\u00adtive pro\u00adtec\u00adtion con\u00adcepts.\u201d<\/p>\n<cite>Simon Nutz, Indus\u00adtrial Secu\u00adrity at Pilz<\/cite><\/blockquote>\n<\/div>\n\n\n\n<p><strong>Kuczera:&nbsp;<\/strong>Exactly.Pilz actively brings its expe\u00adri\u00adence to stan\u00addards com\u00admit\u00adtees. EN 50742 is cur\u00adrently in devel\u00adop\u00adment \u2013 a stan\u00addard for pro\u00adtec\u00adtion against machine cor\u00adrup\u00adtion. We are expecting the first draft at the end of the year.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Training for greater competence<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">Is there also training on Industrial Security?<\/h5>\n\n\n\n<p><strong>Nutz:&nbsp;<\/strong>Yes, our entire training port\u00adfolio has been adapted to the Machinery Reg\u00adu\u00adla\u00adtion. Secu\u00adrity is a com\u00adpo\u00adnent of every course. We also offer two spe\u00adcialist training courses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fun\u00adda\u00admen\u00adtals of Indus\u00adtrial Secu\u00adrity<\/li>\n\n\n\n<li>CESA&nbsp;\u2013&nbsp;Cer\u00adti\u00adfied Expert for Secu\u00adrity in Automa\u00adtion<\/li>\n<\/ul>\n\n\n\n<p>The basic training course delivers the\u00ado\u00adret\u00adical knowl\u00adedge and prac\u00adtical exam\u00adples. In the CESA training, we delve deeper into IEC 62443 and del\u00ade\u00adgates qualify as secu\u00adrity experts for indus\u00adtrial automa\u00adtion sys\u00adtems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 steps to Industrial Security \u2013 what companies should do now<\/h2>\n\n\n\n<div class=\"wp-block-group mgznkr-elements mgznkr-accordion is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">1. Carry out a risk analysis<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Which assets are worth pro\u00adtecting? What is the worst case?<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">2. Integrate Security into the Safety strategy<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Safety func\u00adtions must be pro\u00adtected from manip\u00adu\u00adla\u00adtion.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">3. Increase communication with operators<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Only they know the spe\u00adcific appli\u00adca\u00adtion sce\u00adnario and risk.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">4. Set up a firewall and access protection<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Basic mea\u00adsures such as net\u00adwork sep\u00ada\u00adra\u00adtion and access con\u00adtrol are essen\u00adtial.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">5. Comply with standards and laws<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>CRA, NIS 2 and MR define clear require\u00adments.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">6. Evaluate Security cyclically<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>A one-off risk assess\u00adment is not enough \u2013 threats change.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group link-pilz no headline is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Dis\u00adcover Pilz\u2019s Indus\u00adtrial Secu\u00adrity training courses: <a href=\"https:\/\/www.pilz.com\/en-INT\/trainings\/industrial-security-trainings\" target=\"_blank\" rel=\"noreferrer noopener\">Indus\u00adtrial Secu\u00adrity training in accor\u00addance with IEC 62443<\/a><\/p>\n<\/div>\n\n\n\n<p style=\"font-size:17px;font-style:italic;font-weight:400\">This inter\u00adview was con\u00adducted by Johannes Gillar and appeared in KEM Konstruktion|Automation, 06\/2025 issue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secu\u00adrity becomes manda\u00adtory: New EU reg\u00adu\u00adla\u00adtions such as the Cyber Resilience Act (CRA), NIS 2 and the Machinery Reg\u00adu\u00adla\u00adtion man\u00addate greater Secu\u00adrity in pro\u00adduc\u00adtion. Matthias Kuczera and Simon Nutz explain what machine man\u00adu\u00adfac\u00adturers and oper\u00ada\u00adtors need to know now \u2013 and how they can pro\u00advide effec\u00adtive pro\u00adtec\u00adtion for their plant.<\/p>\n","protected":false},"author":29,"featured_media":4419,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"wp_typography_post_enhancements_disabled":false,"footnotes":""},"categories":[19,75,11],"tags":[],"class_list":["post-4063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industrial-security","category-issue-2-2025","category-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/4063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/comments?post=4063"}],"version-history":[{"count":4,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/4063\/revisions"}],"predecessor-version":[{"id":4471,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/4063\/revisions\/4471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media\/4419"}],"wp:attachment":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media?parent=4063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/categories?post=4063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/tags?post=4063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}