SchloĂźstr. 5, 83250 Marquartstein, Deutschland
+49 (0)8641 6270010
info@botiguard.email

🇫🇮 MEET US AT THE SLUSH IN NOVEMBER 2022 IN HELSINKI 🇫🇮 

Cybersecurity in manufacturing – a Best Practice Overview

Cybersecurity in manufacturing – a Best Practice Overview

Cybersecurity in manufacturing – a Best Practice Overview

Cybersecurity in manufacturing and production plants is very important, as one single outage could lead to severe issues to the whole supply chain and stop the whole production process. In this paper, we will explain you common vulnerabilities in the manufacturing area and possible counter measures.

Some of the common vulnerabilities in production plants and environments are:

  • Insecure physical access to production servers and machines
  • Insecure user configuration and operation
  • Networks are insecurely configured
  • Regular cybersecurity audits are not conducted
  • Operation of deprecated software and hardware
  • Auditing logs of jump hosts not activated
  • Insecure remote access for maintenance
  • Supplier and maintenance contractors do not fulfill security standards

How to prevent cybersecurity incidents in the production area?

  • Establish a physical access concept (e.g. secure housing, USB port blocker)
  • Review admin permission and operate software as normal user
  • Implement a password management system
  • Conduct regular cybersecurity audits and trainings
  • Consider cybersecurity audits of external suppliers
  • Create a crisis and restore plan
  • Identify your high risk systems
  • And more

Get professional support

Botiguard has a lot of experience in cybersecurity in manufacturing plants. Botiguard can detect vulnerabilities that may open a door to an attack due to security misconfigurations. We will support you to make the demand for action transparent.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Kontakt

Write to us
Close
Startpaket (kostenlos)Einmalige PrĂĽfung
Umfang
Endpunkte
z.B. Domains, Subdomains, IPs
limitiert auf die Haupt-Domain8 Dienste und Subdomains werden standardmäßig geprüft (z.B. smtp.domain.de)
+ 10 weitere frei festlegbar
PrĂĽfungsintervalllimitiert 1x pro Jahr pro Kundeindividuell
Planbarkeit
Scanner IP bekannt âś”
Testzeit festlegbar (z.B. außerhalb Geschäftszeiten)✔
Ă–ffentlich erreichbare IT-Infrastruktur
Kritische Dienste und Ports
z.B. RDP, Samba, SSH, FTP
✔✔
Robots.txt✔✔
Kryptografie-Test✔✔
Passive Reconnaissance
Web-Konferenz mit Bot✔✔
Domain-Security
SPF, DKIM, DMARC, WHOIS
✔✔
Darknet-PrĂĽfung:
Suche nach geleakten Zugängen
âś”
e-Mail Security und Spoofingâś”
5 gefälschte e-Mails
âś”
30 gefälschte e-Mails
Automatische Erkennung von Subdomainsâś”
UP-TO-DATE SICHERHEIT
Aktuelleste Cybersicherheits-Bedrohungen
z.B. aktuelle CVEs und Einfallstore
âś”
eMail Alarmâś”
Niedrige Priorität
âś”
Hohe Priorität
Zusatzpakete
Weitere dazugehörige Endpunkte10 €
Kundenspezifische Anpassungennein
Virtuelle Beratung durch Security Experten99 € / h
Daten in eigenem Vserver49 €