ADVERTISING FEATURE
On day one of @AuManufacturing’s new Cybersecurity – Identity and Access Management series, Rana Gupta discusses how a zero trust mindset can help protect your trade secrets and critical data.
While the pandemic has had dramatic consequences, it has also created significant economic opportunities for Australian manufacturers.
Just last December, the Government announced it would fast track its $1.5 billion Modern Manufacturing Scheme to strengthen Australia’s capabilities and create more jobs.
But combined with an increased digitisation of the sector, this also means heightened exposure to rampant cybercrime.
As Deloitte’s MAPI Smart Factory Study pointed out, almost half (48 per cent) of manufacturers identify operational risks, which include cybersecurity, as the greatest danger.
Successful attacks are leading to significant loss of production, critical data and trade secrets, which are risks the sector cannot afford as it starts to regenerate after two years of pandemic disruption.
The issue isn’t about whether manufacturers invest enough in cybersecurity protections, but rather where those investments are, and are not, being made.
Digital identities: cyber frontier for the next decade of manufacturing
Whether they run smart factories or are still navigating their digitisation journey, manufacturers face the same issue: security perimeters have been pushed beyond physical walls and they now operate in a completely ‘perimeter-less’ environment.
This means workers both within the factory and in the corporate office, whether in-person or online, need to gain access to applications and systems using their digital identity.
Every time a staff member attempts to connect to a machine or any corporate system, their digital identity needs to be verified and approved as safe and legitimate through appropriate levels of authorisation.
Manufacturers’ weakest link: humans
Machines and digital systems can be protected with plenty of cybersecurity layers, but it only takes one human mistake to compromise an entire organisation. Human error remains a major source of breaches.
The extra challenge for manufacturers lies in the hybrid, online/offline nature of their environment, as well as having to protect digital processes, physical machines, and a very disparate workforce.
While white collar workers tend to have more awareness around cybersecurity and keeping digital systems secure, blue-collar employees often require more education and support.
This disparity makes security and access control (i.e. who should / shouldn’t have access) increasingly challenging and costly. It also often results in more complexity with many different identification and authentication systems is use.
This ultimately creates more security gaps than it bridges.
Stronger Identity and Access Management wrapped in a Zero Trust approach
Manufacturers need to shift their Identity and Access Management (IAM) policies, and opt for solutions that are intuitive and easy-to-use, as well as remove layers, not add complexity.
The key to effectively protect digital identities is to adopt a ‘trust no one, verify everywhere’ mentality. This ‘zero trust’ approach ensures only authorised and authenticated individuals can gain access to online systems, corporate assets and data.
Here are five priority areas to consider:
With the right IAM platform and the adoption of a Zero Trust mindset, manufacturers can better protect their trade secrets and critical data, as well as empower staff so they can keep on their growth path and start 2022 with a bang rather than a breach!
For more information about how you can kick-start or improve your digital identities protection journey, please visit Thales Cloud Protection & Licensing (CPL)’s website or get in touch with one of Thales’ experts today.
Rana Gupta is APAC Regional VP, Authentication & Encryption, Thales
@AuManufacturing’s Cybersecurity – Identity and Access Management series is brought to you through the support of Thales Cloud Protection & Licensing (CPL).
Subscribe to our free @AuManufacturing newsletter here.