IND.2.4 Machine
A machine is a technical device that performs automated tasks. A typical example is a machine tool that processes workpieces in a predefined manner. It is controlled by an IT system that specifies the corresponding work instructions and steps.
Description
Introduction
A machine is a technical device that performs automated tasks. A typical example is a machine tool that processes workpieces in a predefined manner. It is controlled by an IT system that specifies the corresponding work instructions and steps. Such machines are also referred to as automata.
Machines are usually designed by machine builders and equipped with certain predefined functions. However, the operator of the machine can also determine the parameters according to which it is to operate — for example, shapes to be milled or calibrations for specific materials. To allow operators to modify the parameters, machines have various interfaces, such as for removable storage media, specialized programming devices, or network access.
Machine builders also frequently offer remote maintenance services to detect early wear or to respond quickly in problem situations.
Objective
This building block describes how electronically controlled, semi- or fully automatic machines (e.g., CNC machines) can be secured, regardless of manufacturer, design, specific intended use, and location.
Scope and Modeling
The building block IND.2.4 Machine MUST be applied once to each machine.
This building block supplements the superordinate building block IND.2.1 General ICS Component and requires that building block to have been implemented. Furthermore, only requirements for machines are defined to which an institution does not have access to the internal structures.
No security requirements for process control and automation technology are described here either. For this, the building block IND.1 Process Control and Automation Technology MUST be implemented. Likewise, the area of functional safety is not addressed. Further information on this can be found in the building block IND.2.7 Safety Instrumented Systems.
Threat Landscape
Since IT-Grundschutz building blocks cannot address individual information domains, typical scenarios are used to describe the threat landscape. The following specific threats and vulnerabilities are of particular relevance for the building block IND.2.4 Machine.
Failure or Disruption Due to Insufficient Maintenance
If machines are not maintained regularly, they may cease to function correctly prematurely or fail entirely. Malfunctions can, for example, endanger employees or significantly impair production.
Targeted Manipulation
If the interfaces of a machine are insufficiently protected, the machine can be manipulated — for example, via local programming devices or network services. This can cause workpieces to be damaged or entire product lines to be defective. An attack could also damage the machine itself, thereby causing economic loss.
Requirements
The following are the specific requirements of the building block IND.2.4 Machine. The Information Security Officer (ISO) is responsible for ensuring that all requirements are fulfilled and reviewed in accordance with the established security concept. The ISO MUST always be involved in strategic decisions.
Additional roles are defined in the IT-Grundschutz Compendium. These SHOULD be filled insofar as this is meaningful and appropriate.
| Responsibility | Role |
|---|---|
| Primarily responsible | ICS Information Security Officer |
| Additional responsibilities | OT Operations (Operational Technology, OT) |
Exactly one role SHOULD be primarily responsible. There may additionally be further responsibilities. If one of these additional roles is primarily responsible for fulfilling a requirement, that role is listed in square brackets after the requirement heading. The use of singular or plural says nothing about how many people SHOULD fill these roles.
Basic Requirements
The following requirements MUST be fulfilled with priority for this building block.
IND.2.4.A1 Remote Maintenance by Machine and Plant Builders (B) [OT Operations (Operational Technology, OT)]
A central policy MUST exist for the remote maintenance of a machine. This policy MUST specify how the respective remote maintenance solutions are to be used. The policy MUST also define how communication connections are to be protected. Furthermore, it MUST describe which activities during remote maintenance are to be monitored.
In addition, it SHOULD NOT be possible for remote maintenance of a machine to gain access to other IT systems or machines belonging to the institution.
It MUST be agreed with service providers how they are permitted to use the information stored in the machine.
IND.2.4.A2 Operation After End of Warranty (B) [OT Operations (Operational Technology, OT)]
A process MUST be established that ensures the machine can continue to be operated securely beyond the warranty period. For this purpose, further support services MUST be contractually agreed with the suppliers.
Standard Requirements
No standard requirements are defined for this building block.
Requirements for High Protection Needs
No requirements for elevated protection needs are defined for this building block.
Additional Information
Good to Know
No further information is available for the building block IND.2.4 Machine.