Kimberly Bass, Accenture
“Security is too often an afterthought, but if it’s built in from the start, it is much easier to design a secure system that doesn’t interfere with legitimate users,” she says.
Even simple measures such as defining permissions based on network zones and user roles can not only make the system more secure, but it can also prevent operator errors, Applebaum explains.
Kristen Nash, account manager for IoT platforms at Telit, observes that semiconductor industry IoT projects are focused on providing secure, configurable, end-to-end remote access across equipment, geographies, and separate enterprises – and this includes coordinating access with multiple original equipment manufactuers (OEMs). However, in the “broader IIoT segment encompassing all verticals, this ‘outside the walls’ approach isn’t common…yet,” she notes.
With new IIoT services controlling access to systems and data while allowing an industrial facility to protect its intellectual property, Nash believes that one day, achieving cybersecurity via air gaps (physically isolating networks) will be “a relic of the past.”