Categories
News

Industrial security lifecycle

Security is a “moving target”, that is, security changes during a product’s lifecycle. Attackers develop increasingly better methods to overcome defence measures, so defence measures against cyber threats have to be improved continuously. The responsibility for this lies primarily with plant operators. An effective security strategy can increase the service life of your plant. Machine builders and component manufacturers should immediately inform the operators about new security problems. You must provide updates for your device’s software to enable customers to remedy any weaknesses. If system integrators are involved in the process, they act as an intermediary between manufacturer and operator. It is important that everyone involved works in close collaboration throughout the entire product lifecycle. Only this will result in a high degree of protection.

We are safety experts. It’s important to us that our products are not only safe, but also secure. That’s why we commissioned TÜV Süd to scrutinise our development processes and test them on the basis of the standard IEC 62443-4-1, which defines secure product development, the “Security Development Lifecycle Process” (SDL process). This approach examines potential security features, even as a new product is being designed. It is intended to ensure that all of a product’s security risks are detected by modelling the threats and, ideally, rectifying them in the product during the development process. http://www.pilz.com

We are safety experts. It’s important to us that our products are not only safe, but also secure. That’s why we commissioned TÜV Süd to scrutinise our development processes and test them on the basis of the standard IEC 62443-4-1, which defines secure product development, the “Security Development Lifecycle Process” (SDL process). This approach examines potential security features, even as a new product is being designed. It is intended to ensure that all of a product’s security risks are detected by modelling the threats and, ideally, rectifying them in the product during the development process.

Leave a Reply