/
사이버 레질리언스

3 Ways to Keep Your Manufacturing Operation Resilient Against Cyberattacks

As the manufacturing industry continues to embrace automation, connectivity, and smart systems, it also becomes a prime target for cyberattacks. Manufacturers are under pressure to continue innovation while simultaneously securing against their ever-increasing vulnerability.  

The recent wave of cyber threats, including the looming possibility of halted operations like Norwegian manufacturer Tomra has faced, underscores the need for manufacturing companies to fortify their cyber defenses and cultivate resilience in the face of inevitable breaches and ransomware attacks.  

Learn more about challenges facing manufacturers in our industry brief.

The manufacturing industry's cyberattack threat

Manufacturing is no stranger to the havoc breaches can wreak. Take, for instance, the recent cyberattack on Tomra. The Norwegian company manufactures waste collection and sorting products and operates 100,000 recycling systems worldwide. In July, they discovered that some data systems were impacted by a cyberattack, causing the organization to immediately disconnect some systems to contain the incident. They announced that they would keep all impacted systems offline until the attack is resolved.  

While the news is unfortunate, it’s not surprising that a manufacturer would be impacted by a cyberattack. Manufacturers are attractive targets for attacks due to the catastrophic losses they can incur if their production, shipping, and invoicing processes are disrupted. Threat actors know that they can easily disrupt operations, steal data, and cause harm to the business.  

The incident at Tomra also highlights a common challenge faced by manufacturers — protecting legacy equipment. Systems and machines, varying in age and capabilities, constitute a complex ecosystem that can be difficult to secure uniformly. Many manufacturers are still using equipment running on software that is no longer getting security updates, at end-of-life (EOL), or using out-of-date security measures.  

In the wake of the attack, Tomra faces the formidable task of identifying infected systems, isolating them from clean ones, and expediting recovery. The urgency of the situation was compounded by the potential persistence of attackers within the environment, the need to take systems offline, and the continued standstill of operations during restoration.

Why manufacturing needs breach containment

As cyberattacks become more sophisticated, traditional network-based security approaches are insufficient to prevent the spread of an attack. Manufacturers need to adopt a Zero Trust approach focused on protecting the individual asset, assuming breaches are inevitable, and containing breaches when they do happen. This means building least-privilege access based on verified identity so that only verified communications are allowed on an asset-by-asset basis.  

A Zero Trust technology like microsegmentation separates the network into granular zones to contain the spread of ransomware attacks and breaches. In fact, ZTS is a foundational and strategic pillar of any Zero Trust architecture.

3 tips to strengthen defenses and build resilience in the face of cyberattacks

As the threat landscape evolves, so must manufacturers’ cybersecurity strategies. Relying solely on traditional network-based security measures is no longer sufficient. To bolster resilience and enhance cyber defenses, manufacturers need to embrace a Zero Trust security strategy that revolves around a “never trust, always verify” approach.  

Here are three tips to fortify your manufacturing resilience against cyberattacks:

1. Embrace an "assume breach" mindset

The inevitability of breaches demands a shift in perspective. Rather than fixating solely on prevention, manufacturers should expect breaches to happen as a normal part of today’s threat landscape. The goal is not to avert every potential breach but to minimize the impact of such incidents. By acknowledging that breaches may occur and focusing on mitigating their effects, companies can proactively develop strategies that enhance their ability to withstand attacks. The emphasis shifts from averting catastrophe to containing and managing incidents effectively.

2. Plan for resilience, not just prevention

Traditional approaches to cybersecurity often prioritize prevention and detection technologies that aim to identify and stop every potential threat. However, the landscape has evolved – modern cyber threats, including new AI-generated attacks, are able to enter the network spread so quickly that prevention and detection technologies can’t mitigate them fast enough. While these technologies are an important part of any cybersecurity strategy, they’re not enough to secure against today’s disruptive, and potentially catastrophic, breaches.

That’s why it’s important for manufacturing organizations to invest in technologies that prevent an attack reaching critical infrastructure. A prime example is the adoption of Zero Trust Segmentation (ZTS). This approach stops the spread of breaches by containing them at source. This requires an approach that is flexible and agile, unlike traditional, static, network-based firewalls. By isolating affected segments, manufacturers gain greater control over the situation, facilitating faster remediation and minimizing operational disruptions.

3. Implement a Zero Trust strategy

At the heart of modern manufacturing resilience lies a Zero Trust strategy. This approach operates on the premise of "never trust, always verify." It involves continuously verifying, authenticating, and authorizing every user seeking network access, whether from within or outside the organization, to ensure that only validated communications are permitted. By identifying the most vulnerable points in the network and prioritizing defense measures accordingly, manufacturers can create robust barriers around high-value applications and data. Restricting access to critical components minimizes the attack surface and enhances overall security.

The Tomra cyberattack serves as a reminder to the manufacturing industry of the urgency to fortify cyber defenses and embrace resilience as a core tenet. The path to a secure and thriving future for your organization lies in proactive preparation and adaptable strategies.

Learn more about how Illumio can help secure your manufacturing organization here.  

관련 주제

관련 기사

데이터센터 및 클라우드 보안: 애플리케이션 매핑
사이버 레질리언스

데이터센터 및 클라우드 보안: 애플리케이션 매핑

어떤 테크 컨퍼런스에서든 현장을 돌아다니다 보면 여러분이 유행어 빙고 카드에 가장 먼저 남기는 단어가 가시성이 될 것이라고 장담할 수 있습니다.거의 모든 부스에서 볼 수 있습니다.하지만 솔루션에 가시성이 있다고 해서 목표 달성에 필요한 것이 무엇인지 알 수 있는 것은 아닙니다.특히 보안과 관련해서는 더욱 그렇습니다.

에너지 산업을 위한 사이버 레질리언스를 위한 3단계
사이버 레질리언스

에너지 산업을 위한 사이버 레질리언스를 위한 3단계

TSA 보안 지침 업데이트, 전문가 보안 권장 사항, 에너지 부문의 사이버 복원력 3단계에 대해 알아보십시오.

BT와 일루미오: DORA 규정 준수의 간소화
사이버 레질리언스

BT와 일루미오: DORA 규정 준수의 간소화

사이버 복원력을 높이고, ICT 위험을 관리하고, 금융 기관이 2025년 1월 DORA 규정 준수 기한에 대비할 수 있도록 준비하는 방법을 알아보십시오.

제조사가 IIoT 리소스를 랜섬웨어로부터 보호해야 하는 이유
랜섬웨어 억제

제조사가 IIoT 리소스를 랜섬웨어로부터 보호해야 하는 이유

제조 부문의 IIoT 리소스에 대한 랜섬웨어 위험에 대한 통찰력을 얻으십시오.

Brooks Running이 제공하는 소매업체 및 제조업체를 위한 5가지 제로 트러스트 팁
사이버 레질리언스

Brooks Running이 제공하는 소매업체 및 제조업체를 위한 5가지 제로 트러스트 팁

신발 소매업체인 Brooks Running이 제로 트러스트 제어를 실용적인 방식으로 구현한 훌륭한 기업인 이유를 알아보십시오.

제조업체가 제로 트러스트 세그멘테이션을 구현해야 하는 9가지 이유
제로 트러스트 세그멘테이션

제조업체가 제로 트러스트 세그멘테이션을 구현해야 하는 9가지 이유

제조업체가 제로 트러스트 세그멘테이션을 사용하여 랜섬웨어 및 보안 침해의 위협으로부터 운영을 보호하도록 Illumio가 어떻게 지원하는지 알아보십시오.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?