Are Smart Factories Secure?

December 12, 2017

Manufacturers are adopting Smart Factory technologies that connect devices, production systems, processes and even entire factories in networked ecosystems that are more intelligent, adaptable and self-aware. The goal: actionable insights that can be used to increase productivity, make production processes more agile and generate new “outcome-based” revenue streams. But are smart factories secure?

This digitization of the factory is part of an overall trend toward digital transformation that no modern industrial enterprise can ignore and remain competitive. However, moving from a closed, siloed factory environment to an open, connected model carries with it risks. As with corporate IT systems, connected factories are by their nature more vulnerable to security attacks that are not present in a closed environment. Regardless of the type of security attack, the results can be devastating, culminating in lost production cycles, wasted material, potential harm to personnel, loss of revenue and more. As a result, industrial enterprises face a tough decision: move forward with their digital transformation initiatives or play it safe and be left behind.

Any practical and useful implementation of a security solution must span the entire IIoT stack on the factory floor. This means that the advanced security principles are incorporated as an integral part of the solution and applied at each step in the deployment of connected devices. In today’s modern Smart Factory, numerous sensors and cameras are deployed on the factory floor, which increases the attack surface.

In a Smart Factory, numerous sensors and cameras are deployed on the factory floor.


As these devices are physically exposed, their software can be tampered with to cause a major system meltdown (DDoS attacks). A lack of end-to-end visibility in the IIoT stack is dangerous and makes these attacks difficult to detect. To prevent this kind of attack, the first step to introducing any security measure is to provide visibility in as many areas of the factory as feasible. Securing actuators in the factory network is a high priority since the output of the actuator controls sensors and other actions or processes. An attack targeting an actuator can cause havoc to the production workflow.

Since it is a relatively simple task, anyone with a few technical skills can introduce a sensor or camera into the network. However, deploying devices that do not meet the compliance policies of the organization is a huge security threat. Corlina’s Smart Factory System of Trust provides full visibility as data moves through the stack, including device information, data collection, data transport and network state. To learn more about how we help manufacturers go beyond security to establish trust, contact us at today.

Related articles
Smart Factory Automation Starts with Trust 27 Dec 2017 - Industrial IoT, Smart Factory, Trust

Manufacturers are undergoing one of the biggest transformations since the dawn of the industrial age: using digital technologies to build and modernize their systems and processes into Smart Factories. To help them on their smart factory journey, several global initiatives have been launched: The U.S. has adopted the Industrial Internet Consortium (IIC) The production power-houses of Japan are focusing on the value of “Connected Factories” to bring about the next innovation in manufacturing (monodozkuri ). In Europe, Germany is leading […]

Corlina Bringing Trust as a Service to Smart Factories 24 Nov 2017 - Industrial IoT, Smart Factory, Trust, Trust as a Service

The Corlina team came together in Menlo Park, CA recently to plan the company’s official launch in early 2018. Our team members are located across the globe, so it was both fun and productive to sit in a room together and brainstorm our go to market, product and channel strategies. Our goal: bring “trust as a service” to the millions of small and medium manufacturers worldwide that are building new and upgrading existing production facilities with smart factory technology.   […]