Zero-Trust Model for Smart Manufacturing Industry

被引:7
作者
Paul, Biplob [1 ]
Rao, Muzaffar [1 ,2 ,3 ]
机构
[1] Univ Limerick, Dept Elect & Comp Engn, Limerick V94 T9PX, Ireland
[2] Confirm SFI Ctr Smart Mfg, Pk Point,Dublin Rd, Limerick V94 C928, Ireland
[3] Lero Sci Fdn Ireland Res Ctr Software, Limerick V94 NYD3, Ireland
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 01期
关键词
cybersecurity; zero trust; network security; access control; smart manufacturing; cyber-physical system; Industry; 4.0; internet of things; cloud computing; CYBERSECURITY;
D O I
10.3390/app13010221
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to emerging technologies where serverless applications are running on containers, mobile endpoints, IoT, and cyber-physical systems. Since the beginning of the fourth industrial revolution (Industry 4.0), there has been a massive investment in smart manufacturing which responds in real-time to the supply chain and connects the digital and physical environments using IoT, cloud computing, and data analytics. The zero-trust security model is a concept of implementing cybersecurity techniques considering all networks and hosts to be hostile irrespective of their location. Over the past few years, this model has proven to be a remarkably effective security solution in conventional networks and devices. In this paper, the zero-trust approach will be fully explored and documented explaining its principles, architecture, and implementation procedure. It will also include a background of the smart manufacturing industry and a review of the existing cyber security solutions followed by a proposed design of the zero-trust model along with all the enabling factors for on-premises and cloud-hosted infrastructure. Various security solutions such as micro-segmentation of the industrial network, device discovery, and compliance management tools that are essential in achieving complete zero-trust security are considered in the proposed architecture.
引用
收藏
页数:20
相关论文
共 26 条
  • [1] [Anonymous], EXABEAM WHAT IS SIEM
  • [2] Aufa F.J., 2018, P 2018 4 INT C SCI T, P1
  • [3] BSI, IT SICH BLEIBT ANG B
  • [4] Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
    Buck, Christoph
    Olenberger, Christian
    Schweizer, Andre
    Volter, Fabiane
    Eymann, Torsten
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [5] Beyond Zero Trust: Trust Is a Vulnerability
    Campbell, Mark
    [J]. COMPUTER, 2020, 53 (10) : 110 - 113
  • [6] Cunningham C., 2018, ZERO TRUST EXTENDED
  • [7] Domke D., ABB IBM BOLSTER CYBE
  • [8] Geissbauer R., 2016, INDUSTRY
  • [9] Hajj R., CYBER SECURITY SMART
  • [10] Design Principles for Industrie 4.0 Scenarios
    Hermann, Mario
    Pentek, Tobias
    Otto, Boris
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 3928 - 3937