{"id":443,"date":"2022-11-15T23:45:00","date_gmt":"2022-11-15T22:45:00","guid":{"rendered":"https:\/\/pilz-magazine.com\/de\/?p=443"},"modified":"2024-09-11T10:41:56","modified_gmt":"2024-09-11T08:41:56","slug":"security-affects-us-all","status":"publish","type":"post","link":"https:\/\/pilz-magazine.com\/en\/security-affects-us-all\/","title":{"rendered":"Security affects us all"},"content":{"rendered":"\n<p>Com\u00adpared with the more tan\u00adgible topic of machinery safety, indus\u00adtrial secu\u00adrity still appears to be more of an abstract con\u00adcept. Many \u00adpeople pri\u00admarily asso\u00adciate it with external cyber attacks, but secu\u00adrity is rel\u00ade\u00advant down to the smallest machine in a pro\u00adduc\u00adtion facility. \u00adSecu\u00adrity encom\u00adpasses safety, ensuring its integrity and thus the pro\u00adtec\u00adtion of human and \u00admachinery. With the new Euro\u00adpean Machinery Reg\u00adu\u00adla\u00adtion, secu\u00adrity mea\u00adsures will become oblig\u00ada\u00adtory from 2025. But even today com\u00adpa\u00adnies are already working to ensure the safety of per\u00adsonnel, machinery and data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Assuming responsibility<\/strong><\/h2>\n\n\n\n<p>If man\u00adage\u00adment fails to imple\u00adment gen\u00aderal organ\u00adi\u00adsa\u00adtional mea\u00adsures and instruc\u00adtions when struc\u00adturing work, it can be held liable for this. Prob\u00adlems such as near-acci\u00addents or the occur\u00adrence of new risks at the work\u00adplace must result in suit\u00adable mea\u00adsures. Reg\u00adular checks iden\u00adtify any need for action in good time. An example to illus\u00adtrate this: An employee opens a safety gate and thus brings the machine to a stop. The man\u00adu\u00adfac\u00adturing process is inter\u00adrupted, resulting in eco\u00adnomic losses. The employee didn\u2019t \u00adactu\u00adally have autho\u00adri\u00adsa\u00adtion to open the safety gate, but due to a lack of work instruc\u00adtions they were unaware of this, and access to the plant was not clearly reg\u00adu\u00adlated. In this case, the task was del\u00ade\u00adgated to an unqual\u00adi\u00adfied person and there were no work instruc\u00adtions or they were incom\u00adplete. The com\u00adpany man\u00adage\u00adment is thus liable for the con\u00adse\u00adquences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>An all-round safe workplace<\/strong><\/h2>\n\n\n\n<p>Employee pro\u00adtec\u00adtion goes hand in hand with \u00adlia\u00adbility pro\u00adtec\u00adtion: The oper\u00adator of the plant or machinery is respon\u00adsible for the pro\u00adtec\u00adtion of its employees and must take appro\u00adpriate mea\u00adsures. If a machine is pro\u00adtected by a safety gate, for example, but access is not reg\u00adu\u00adlated, a cleaner or sim\u00adilar could enter the machine\u2019s danger zone and be injured. In this example, the safety device is not suf\u00adfi\u00adcient. In the course of a hazard assess\u00adment, poten\u00adtial hazard sources would have been iden\u00adti\u00adfied early on: Is access to the machine suf\u00adfi\u00adciently pro\u00adtected? What qual\u00adi\u00adfi\u00adca\u00adtion must the employees have on the machine and for which work steps are they then autho\u00adrised?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-1024x640.jpg\" alt class=\"wp-image-584\" srcset=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-1024x640.jpg 1024w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-300x188.jpg 300w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-768x480.jpg 768w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-1536x960.jpg 1536w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-540x338.jpg 540w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher-1080x675.jpg 1080w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2023\/06\/Pilz-Industrial-Security-macht-die-Maschinenbedienung-sicher.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Prevent manipulation<\/strong><\/h2>\n\n\n\n<p>A third area that is becoming increas\u00adingly rel\u00ade\u00advant is data pro\u00adtec\u00adtion. Secu\u00adrity is often asso\u00adci\u00adated with this as stated pre\u00advi\u00adously and there is great con\u00adcern that an attacker could manage to access a company\u2019s OT net\u00adwork. This can happen, for example, if a USB stick with mal\u00adware has been inten\u00adtion\u00adally or unin\u00adten\u00adtion\u00adally used on a machine. If there is no seg\u00admen\u00adta\u00adtion within pro\u00adduc\u00adtion, hackers can thus not only cripple this one machine, but man\u00adu\u00adfac\u00adturing as a whole. This is the \u201cworst case\u201d, and this sit\u00adu\u00ada\u00adtion is also sen\u00adsi\u00adtive with a view to data pro\u00adtec\u00adtion. Data and exper\u00adtise must be pro\u00adtected against external attacks as well as from danger orig\u00adi\u00adnating within the com\u00adpany.<\/p>\n\n\n\n<p>All three sce\u00adnarios described are not only rel\u00ade\u00advant for rea\u00adsons relating to lia\u00adbility, they also have a major influ\u00adence on a company\u2019s pro\u00adduc\u00adtivity. So what can com\u00adpa\u00adnies do to play it safe? Safety pre\u00adcau\u00adtions must be reg\u00adu\u00adlarly scru\u00adti\u00adnised and adapted to the cur\u00adrent con\u00addi\u00adtions. A holistic risk analysis indi\u00adcates pos\u00adsible weak\u00adnesses and includes both safety and indus\u00adtrial secu\u00adrity. Based on this analysis, appro\u00adpriate mea\u00adsures can be taken and the machinery retro\u00adfitted, if nec\u00ades\u00adsary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Clearly regulate access<\/strong><\/h2>\n\n\n\n<p>For the exam\u00adples men\u00adtioned, com\u00adpre\u00adhen\u00adsive iden\u00adtity and access man\u00adage\u00adment, meaning the reg\u00adu\u00adla\u00adtion of accesses and entrances, could be an ade\u00adquate solu\u00adtion. If an access per\u00admis\u00adsion system PITreader is used, only autho\u00adrised \u00adpeople are issued an RFID key with their indi\u00advidual per\u00admis\u00adsions for plant and machinery on which they carry out work. They only achieve the desired access after they autho\u00adrise them\u00adselves on the machine by inserting their key into the PITreader. Autho\u00adri\u00adsa\u00adtions can be issued and man\u00adaged cen\u00adtrally. If there is how\u00adever a safety inci\u00addent or manip\u00adu\u00adla\u00adtion, the system can be used to track who last worked on the machine.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Lock out attackers<\/strong><\/h2>\n\n\n\n<p>If machines are to be pro\u00adtected against unau\u00adtho\u00adrised access and manip\u00adu\u00adla\u00adtion, an indus\u00adtrial fire\u00adwall such as Secu\u00adri\u00adty\u00adBridge from Pilz also offers pro\u00adtec\u00adtion. It mon\u00adi\u00adtors the data com\u00admu\u00adni\u00adca\u00adtion within an indus\u00adtrial automa\u00adtion net\u00adwork. To pro\u00adtect the data flow of a pro\u00adduc\u00adtion facility, switch\u00adable and acti\u00advat\u00adable prod\u00aducts can also be an appro\u00adpriate mea\u00adsure. The acti\u00advat\u00adable USB\u20112.0 host inter\u00adface of the oper\u00ada\u00adtion ele\u00adment PIT&nbsp;oe&nbsp;USB con\u00adtrols the manip\u00adu\u00adla\u00adtion-proof import of pro\u00adgrams, export of data and con\u00adnec\u00adtion of a key\u00adboard or mouse. If the oper\u00ada\u00adtion \u00adele\u00adment is com\u00adbined with the access per\u00admis\u00adsion system PITreader, the acti\u00adva\u00adtion is only \u00adper\u00adformed with the cor\u00adre\u00adsponding autho\u00adri\u00adsa\u00adtion. <\/p>\n\n\n\n<p>These mea\u00adsures can be easily inte\u00adgrated or retro\u00adfitted into an indus\u00adtrial appli\u00adca\u00adtion. \u00adIndus\u00adtrial Access Man\u00adage\u00adment thus con\u00adtributes to greater indus\u00adtrial secu\u00adrity and ensures the integrity of the machinery safety. At the same time, the com\u00adpany man\u00adage\u00adment can rely on this holistic safety con\u00adcept and thus assumes respon\u00adsi\u00adbility for the com\u00adpany and for its employees.<\/p>\n\n\n\n<div class=\"wp-block-group link-pilz is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"link-pilz\"><a href=\"https:\/\/www.pilz.com\/en-INT\/access\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.pilz.com\/en-INT\/access<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Indus\u00adtrial Secu\u00adrity not only includes the pro\u00adtec\u00adtion of data, but at the same time also guar\u00adan\u00adtees the integrity of safety func\u00adtions and mea\u00adsures. If a pro\u00adduc\u00adtion \u00adworker starts up a plant, for example, even though they are not autho\u00adrised to do so, this is already con\u00adsid\u00adered a secu\u00adrity inci\u00addent. This manip\u00adu\u00adla\u00adtion, even if \u00adunin\u00adten\u00adtional, endan\u00adgers the safety of other employees. This makes it even more impor\u00adtant to con\u00adsider safety holis\u00adti\u00adcally \u2013 because it also plays a key role in \u00adques\u00adtions of lia\u00adbility.<\/p>\n","protected":false},"author":27,"featured_media":1002,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"wp_typography_post_enhancements_disabled":false,"footnotes":""},"categories":[19,7,1,11],"tags":[],"class_list":["post-443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industrial-security","category-issue-3-2022","category-pilz-magazine","category-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":4,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"predecessor-version":[{"id":1689,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/443\/revisions\/1689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media\/1002"}],"wp:attachment":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}