Layered Security Guidance for Data Asset Management in Additive Manufacturing

被引:0
作者
Milaat F.A. [1 ]
Lubell J. [1 ]
机构
[1] Engineering Laboratory, National Institute of Standards and Technology, Gaithersburg, 20899-8260, MD
关键词
additive manufacturing; asset management; computer-aided design; computer-aided manufacturing; cyber-physical security for factories; cybermanufacturing; cybersecurity framework; Industrial Internet of Things; open security controls assessment language;
D O I
10.1115/1.4064128
中图分类号
学科分类号
摘要
Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes renders them attractive targets for cyber-attacks. Risk-based information technology (IT) and operational technology (OT) security guidance standards are useful resources for AM security practitioners, but the guidelines they provide are insufficient without additional AM-specific revisions. Therefore, a structured layering approach is needed to efficiently integrate these revisions with preexisting IT and OT security guidance standards. To implement such an approach, this paper proposes leveraging the National Institute of Standards and Technology’s cybersecurity framework (CSF) to develop layered, risk-based guidance for fulfilling specific security outcomes. It begins with an in-depth literature review that reveals the importance of AM data and asset management to risk-based security. Next, this paper adopts the CSF asset identification and management security outcomes as an example for providing AM-specific guidance and identifies the AM geometry and process definitions to aid manufacturers in mapping data flows and documenting processes. Finally, this paper uses the open security controls assessment language (OSCAL) to integrate the AM-specific guidance with existing IT and OT security guidance in a rigorous and traceable manner. This paper’s contribution is to show how a risk-based layered approach enables the authoring, publishing, and management of AM-specific security guidance that is currently lacking. The authors believe implementation of the layered approach would result in value-added, non-redundant security guidance for AM that is consistent with the preexisting guidance. © 2024 American Society of Mechanical Engineers (ASME). All rights reserved.
引用
收藏
相关论文
共 61 条
[1]  
ISO/ASTM 52900:2021 Additive Manufacturing – General Principles – Fundamentals and Vocabulary
[2]  
Ding J., Baumers M., Clark E. A., Wildman R. D., The Economics of Additive Manufacturing: Towards a General Cost Model Including Process Failure, Int. J. Prod. Econ, 237, (2021)
[3]  
Wohlers Report 2022: 3D Printing and Additive Manufacturing Global State of the Industry
[4]  
Graves L. M. G., Lubell J., King W., Yampolskiy M., Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives, IEEE Access, 7, pp. 103833-103853, (2019)
[5]  
Yampolskiy M., Schutzle L., Vaidya U., Yasinsac A., Security Challenges of Additive Manufacturing With Metals and Alloys, Critical Infrastructure Protection IX (IFIP Advances in Information and Communication Technology), 466, pp. 169-183, (2015)
[6]  
Barker E. B., Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms, (2020)
[7]  
Stouffer K., Pease M., Tang C. Y., Zimmerman T., Pillitteri V., Lightman S., Hahn A., Saravia S., Sherule A., Thompson M., Guide to Operational Technology (OT) Security, (2023)
[8]  
Yampolskiy M., Gatlin J., Yung M., Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad, Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, pp. 3-9, (2021)
[9]  
Yampolskiy M., King W. E., Gatlin J., Belikovetsky S., Brown A., Skjellum A., Elovici Y., Security of Additive Manufacturing: Attack Taxonomy and Survey, Addit. Manuf, 21, pp. 431-457, (2018)
[10]  
Malekipour E., El-Mounayri H., Common Defects and Contributing Parameters in Powder Bed Fusion AM Process and Their Classification for Online Monitoring and Control: A Review, Int. J. Adv. Manuf. Technol, 95, 1–4, pp. 527-550, (2018)