Construction of data security technology system around "industrial brain + future factory"

01-Beijing

      "Industrial Brain + Future Factory" builds a digital ecology through digital integration. The industrial-level industrial Internet will link the data centers of enterprises in various industrial chains to form a collaborative digital architecture for large and medium-sized enterprises, which will be aggregated into a regional industrial Internet to form regional industrial big data centers or enterprise-side data warehouses. By coordinating and processing the enterprise-side data warehouse and the government-side data warehouse and uploading them to the industrial brain, the sharing and flow of all data can be realized, forming a closed loop of the data value chain, and completing the core of the construction of the digital economic system.

      While "Industrial Brain + Future Factory" is changing the industrial ecology, it also faces more security challenges. At present, countries around the world continue to attach importance to and continuously upgrade the security defense system of the Industrial Internet, but the threat of attacks against the Industrial Internet continues to intensify. The security development of the Industrial Internet still faces enormous challenges. In November 2021, the Danish wind turbine giant Vestas encountered a cyber attack, which destroyed part of its internal IT infrastructure and caused an unspecified data leak; in March 2022, the Japanese Toyota supplier "Kojima Stamping Industry Co. A cyber attack resulted in the shutdown of all 14 Toyota factories in Japan; in late May 2022, Foxconn’s production plant in Tijuana (Mexico) was attacked by ransomware and asked to pay a ransom...Data security incidents have affected The normal operation of the economy and society has also sounded the alarm for my country's industrial safety. Therefore, it is urgent to improve my country's industrial Internet data security capabilities.

02- Necessity of construction

     "Industrial Brain + Future Factory", as an application model for the deep integration of the digital economy and the real economy, needs to attach great importance to the construction of data security to ensure that the data is legally compliant, reliable, controllable, safe and credible.

     The current Cyber ​​Security Law, Data Security Law, Personal Information Protection Law, Data Export Security Assessment Measures, Data Security Management Measures in the Industrial and Informatization Fields, and the industry standard system apply to the industrial field from the perspective of data security governance (such as classification and classification, security management), Specific requirements are put forward for data protection (anti-leakage, anti-tampering, encryption, backup recovery, etc.), data sharing, data export, and data compliance.

        At the same time, "Industrial Brain + Future Factory" involves important national infrastructure and key information infrastructure, which has important strategic significance and value, and may trigger malicious competition and attacks by hostile forces.

03-Data Security Summary Construction

03-1 Data security risk of "industrial brain + future factory"

The introduction of new technologies brings new security risks. The use of large-scale Internet of Things devices and multi-network integration (such as fieldbus, local area network, wireless network, etc.), coupled with the application of new technologies such as mobile edge computing, network function virtualization, and network slicing, lead to uncertainties and unknown factors. And the security and confidentiality of communication information cannot be effectively guaranteed.

After the device is connected to the cloud Internet, it brings new security risks. As industrial enterprises go to the cloud, the development of modern industrial equipment makes the network more open and inclusive. Many industrial Internet devices appear and develop rapidly, but after a long time, exposed devices are vulnerable to damage; industrial Internet devices Many, poor security management performance, old equipment and slow update speed, resulting in the inability to detect or repair vulnerabilities in time, posing a large security risk.

Data interconnection brings new security risks. "Industrial Brain + Future Factory" has more advantages in efficiency, can realize information transmission and processing at an extremely fast speed, and collect and process more data at the same time. The use of cloud-edge-end related technologies can realize the intercommunication and sharing of information data, cross-transmission of various data, multi-dimensional transmission, etc. Although the diversity of data transmission and processing brings many conveniences and facilitates the data processing of staff, it also brings more challenges to data security protection. Due to the large differences between types and data characteristics of industrial data, traditional network security protection work is also difficult to achieve effective data protection processing.

 Security risks at each stage of the data life cycle after the boundary is blurred. The collection stage - "Industrial Brain + Future Factory" involves multiple aspects such as individual enterprises, industrial collaboration, and government, and the data is distributed among massive equipment and systems. Not only is the phenomenon of data islands serious, the data interface specifications of various manufacturers are not uniform, but also each manufacturer adopts its own private protocol, and industrial protocols are diverse and mostly closed, making data difficult to identify and parse; the transmission stage - "industrial brain + future factory" scenario It involves the application of various technologies such as cloud computing, big data, and artificial intelligence, and the flow of data outside the factory is more complex and diverse. It is difficult to effectively capture and trace sensitive data and security threats in environments with large traffic, virtualization, and decentralized networks; storage stage-storage stage is very easy to form data aggregation, and it is necessary to divide areas, set access permissions, and encrypt storage according to data types and levels. means. However, "Industrial Brain + Future Factory" has various data forms and complex formats, which make data classification and hierarchical management and protection difficult; use stage-analysis and utilization of data is an important way for data to be used as a production factor, but data rights and responsibilities are difficult to determine, and security can be guaranteed. Difficulties in trust and empowerment hinder the orderly and safe sharing of data; the exchange and sharing stage - "Industrial Brain + Future Factory" involves data exchange and sharing in the upper-middle-downstream of the industrial chain, multiple fields, and multiple levels, with high data mobility. It is difficult to achieve effective control; other aspects - data collection, protocol conversion, edge computing and other behaviors in the process of multi-source access are vulnerable to risks such as data tampering, data theft, and terminal vulnerability attacks. Involving a large number of low-protection industrial equipment connected to the Internet, there are a large number of high-risk vulnerabilities, which are easy to become targets of attack.

03-2 Key hidden danger industries

     (1) The manufacturing industry is the main application scenario of "Industrial Brain + Future Factory", and it is also the key target of malicious network behavior, involving multiple sub-sectors such as computers, communications, electronic equipment, automobiles, medicine, and textiles.

     (2) National important infrastructure and key information infrastructure such as electricity, energy, and transportation are important supports for "industrial brain + future factory" and are also key targets of cyber attackers. Once attacked, it may cause serious social and economic impacts .

     ( 3 ) Emerging fields such as Internet of Vehicles and medical equipment are the innovative application direction of "Industrial Brain + Future Factory" and also the new trend of cyber attackers, involving a large amount of user data and personal privacy, and facing the risk of leakage.

03-3 Data security technology system construction framework

        The data security system around the "industrial brain + future factory" is not traditionally only aimed at the construction of data access control, data encryption, and data auditing under the data life cycle, but a broader and more complex concept involving equipment, control, Network, platform, industrial APP, identification analysis, data and other aspects of security construction. Therefore, from the perspective of application scenarios, the data security system construction of "Industrial Brain + Future Factory" includes most technical fields such as traditional network security, cloud security, industrial control security, and data security.

       "Industrial Brain + Future Factory" breaks the original situation of relative separation between enterprises and government and enterprises, and uses "wisdom with numbers on the cloud". A joint promotion mechanism of "government guidance-platform empowerment-leading leadership-association service-institutional support" has been constructed to drive the digital and intelligent transformation of enterprises while making their industries more clustered, integrated and centralized. Therefore, the original relatively independent protection methods based on enterprises should be further improved, and the ability to integrate with the industrial Internet should be strengthened, so that the industrial Internet can not only empower business, but also empower security.

"Industrial Brain + Future Factory" Data Security Architecture Diagram

      Integrate event management and security defense systems into the industry chain to protect different roles. For the future factory (enterprise side), for the on-site control layer, centralized monitoring layer, MES layer and enterprise management layer, it provides industrial control security, terminal security, network security and data security technical support capabilities for different scenarios. In terms of industrial brain (cloud), build cloud security, network security, terminal security and data security technical support capabilities for the network side, Iaas side, Paas side, and Saas side respectively. Through the security situation awareness and operation management platform, the industrial brain and the future factory are effectively combined to achieve cloud protection and empower the enterprise security.

Guess you like

Origin blog.csdn.net/a59a59/article/details/129738527