Cybersecurity Design & Implementation

Industrial OT System and Operation is complex and critical as its nature. Hence, designing OT security countermeasures and its deployment does not allow any room for a single error.

A well-designed and hassle-free implementation of security countermeasures is one of the key measures in minimizing the cyber risks and maximizing the plant availability (uptime). If any undesirable error occurs, it could even lead to the failure of safety systems designed to protect human life or induce the process to injure personnel. Therefore, designers of OT security systems and deploying experts must have in-depth knowledge to avoid any nuisance interruption risk to systems’ operation and its consequences. With the convergence of IT and OT in today's industrial control system environments, there is a greater need for a common understanding between all those who support or rely on these systems.


*IT - Information Technology, OT - Operational Technology.

Yokogawa’s cybersecurity design & implementation services

Yokogawa takes “defense-in-depth” security strategy to protect the industrial assets. This approach utilizes multiple layers of defense (physical and electronic) at separate industrial levels by applying policies and procedures that address different types of threats. For example, multiple layers of network security protect networked assets, data, and endpoints, while multiple layers of physical security protect high-value assets. If one layer is broken or affected, other layers continue to protect against the attack.

defense in depth

 

Expertise knowledge and skills are required to implement defense-in-depth technical measures to keep the operation availability at the highest level. Yokogawa’s security engineers and professionals are always up to date with global and national security standards and trained to meet international qualifications while leveraging Yokogawa’s best practices over 100 years’ experience. We deliver an appropriate vendor-independent OT security solution to address the various issues faced by your plant. We have specific knowledge about how to update your architecture in accordance with the IEC 62443, a global security standard for Industrial Control Systems, and how to integrate your OT architecture with the IT domain. 
Following through the Security Program cycle, in aligning with complete risk assessment, company’s policies, procedures, and business cases, Yokogawa ensures deployment of the best hassle-free technical countermeasures in the design & implementation phase.

security program's design and implementation
 

Customer benefits who implement and design their cybersecurity by Yokogawa

Yokogawa’s security solutions are a comprehensive security suite of indispensable solutions for the sustainability and efficiency of your control system. Our highly reliable security design solutions and best-working implementation services bring the following benefits to our customers.

  • Achieve the highest business continuity plan by increasing the availability, integrity, and confidentiality of the control system.
  • Detects and records undesirable activities and modifications to applications.
  • Control access to the network and detect unwanted access or activity.
  • Protect viewing, editing, and use of specific pieces of control system content.
  • Control who, what, where, and when access is allowed to which applications or devices.
  • Support flexible and scalable modifications required for defined standards and targeted security levels.
  • Tackle security challenges arising from industrial digital transformation with peace of mind and increase the investment value.
  • Close the gap between people, process, and technology by following the comprehensive security program from a lifecycle perspective.
     

Details

Yokogawa provides various security solutions from endpoints to network boundaries in your plant to solve the major challenges.

  • Network design and architecture
    Yokogawa understands the need to secure protected areas of a plant. Accordingly, Yokogawa provides secure network architecture, a design based on IEC 62443 that includes zoning or grouping of assets based on their security requirements. In addition, this secure network architecture is equipped with firewalls which are the first line of defense against intrusion from other networks.
  • Centralized AV/OS patch management
    The need to protect a system from malicious attacks is critical for customers. Yokogawa’s Anti-Virus Management and OS Patch Management help secure the system by blocking any form of malicious software and fixing software vulnerabilities which could lead to the disruption of plant operation. In addition, Yokogawa offers “system hardening” which removes all non-essential software programs and utilities from plant workstations.
  • Network management system
    The necessity for network devices to monitor the network status (i.e., network loading, network up/down) can be achieved through the network management system. In addition, the solution can monitor the usage of memory and hard disks of servers. This solution provides centralized management involving a dedicated network monitoring and management server as the point of administration for all monitored clients.
  • Network health check service
    Communication traffic may appear to be working smoothly, but it cannot be seen with the naked eye. The network health check service provides clear reporting on network traffic, enabling close monitoring of all vital communication.
  • Backup and recovery system
    Yokogawa understands that customers need to protect all information in their systems. The backup & recovery system ensures that all information remains intact even after an incident, thus facilitating rapid restoration of the system.
  • Centralized user/PC setting management
    Yokogawa offers a solution that can easily manage all customer resources on a network. The active directory service simplifies user and computer management. Policies can also be created in the active directory to meet the security requirements of the customer. Yokogawa application user/groups will be seamlessly integrated with the active directory.

Looking for more information on our people, technology and solutions?

Contact Us

Top