Skip to main content
Skip table of contents

Security for Smart Manufacturing

Vision

As the electronics manufacturing industry deploys ever more sophisticated and pervasive smart manufacturing solutions, cyber-security becomes more critical. Unmitigated, the threats increase due to the following trends:

  • Increasing integration between manufacturing equipment and facilities on the factory floor with other enterprise systems.

  • Increasing integration across ever more dynamic supply chains from semiconductor fabrication to OSAT to PCBA manufacturing facilities.

  • Increasing volume and variety of data flows from an ever widening array of manufacturing equipment, processes, facility infrastructure, and even the products themselves as they are being integrated and tested.

  • Increasing intelligence and automation as that the data architecture interacts with critical assets and business information (operational, commercial and technical data with IP).

  • Increasing variety of hardware and software components and of their suppliers/sources in the product BOM (bill-of-materials).

Essentially, there are more opportunities for cyber-based attacks and individual opportunities have greater potential to lead to larger-scale damages and losses.

Scope

The coverage here is on protection and mitigation of cyber-security threats to the following:

  1. “Data at rest” ― i.e., data being stored.

  2. “Data in motion” ― i.e., the transmission of data from one entity to another.

  3. “Data at work” ― i.e., the use and processing of data.

  4. The security management and configuration of the supporting infrastructure, e.g., including identification and access control.

  5. Security of the manufactured product.

The roadmap focus is primarily on security within the factory facility with some additional comments on how to extend best practices, guidelines, and standards to enterprise- and ecosystem-level security.

Technical Needs, Gaps and Solutions

The technology issues surrounding cybersecurity, the associated needs, technology status of those needs, as well as gaps and challenges to overcome, are summarized below. The time period considered is from 2023 to 2033.

Technology Status Legend

For each need, the status of today’s technology is indicated by label and color as follows:

In-table color + label key

Description of Technology Status

Solutions not known

Solutions not known at this time

Solutions need optimization

Current solutions need optimization

Solutions deployed or known

Solutions deployed or known today

Not determined

To be determined (TBD)

Definitions for “Gap,” “Challenge,” and “Current Technology Status” are below:

Term

Definition

GAP
in year X

This is what is missing or what below in performance, in today’s technology, to meet the need for year X.

CHALLENGE
in year X

Why is it difficult to meet the need in year X?  Typically, this is some particular technical consequence of that need that is inherently difficult.

CURRENT TECHNOLOGY STATUS in year X

How well does today’s technology and solutions meet the need in year X?
See below for an explanation of the different possible labels used.

Table 1. Smart Manufacturing Security Needs, Gaps, and Today’s Technology Status with Respect to Current and Future Needs

 

ROADMAP TIMEFRAME

TECHNOLOGY ISSUE

TODAY (2023)

3 YEARS (2026)

5 YEARS (2028)

10 YEARS (2033)

Security Management and Automation

NEED

Automated management of security processes and operations

CURRENT TECHNOLOGY STATUS

Solutions need optimization

GAP

Commonality of data models; application programming interfaces (APIs), and orchestration scripting is often proprietary.

Disparate components exist that can help in the process.  OpenConfig for network management exists but it is not explicitly used for security.

CHALLENGE

Existence of manual “shadow IT”, i.e., ad hoc, bottoms-up deployment and management of security solutions.  No standardization in place. Government regulation or buying power may force issue.

NEED

User (i) authentication and (ii) authorization on factory floor. 

CURRENT TECHNOLOGY STATUS

Solutions need optimization

GAP

SEMI E1871/E1882 just published.  Implementation needed.

Secure Data

NEED

Data at rest (i.e., when stored)

For data being stored, it should be―

  • Tagged with data status

  • Associated with a policy (in advance)

e.g., Cybersecurity Maturity Model Certification (CMMC)3, NIST Cybersecurity Framework (CSF) 2.04 in the U.S.

CURRENT TECHNOLOGY STATUS

Solutions need optimization

GAP

Dynamic securing of data depending on the customer’s security status

CHALLENGES

Variety and scale of items whose data needs to be secured.
Difficulty in securing all data to highest possible needed level; dynamically securing requires access or input from other corporate systems, e.g., Procurement or Distribution

CHALLENGES

Upstream promotion of security levels

CHALLENGES

Loss of control when printing

NEED

Data in motion (i.e., Security of transfer and validation of what is transferred)

CURRENT TECHNOLOGY STATUS

Solutions not known

GAPS

Simultaneous delivery of both transfer and validation

CHALLENGES

Validation requires transparency, in contradiction to security of transmission

CHALLENGES

Establishment of data brokers to support solution.

NEED

Data at work (i.e., being processed)

CURRENT TECHNOLOGY STATUS

Solutions need optimization

GAP

Lack of authentication and access control for legacy equipment and industrial control protocols

CHALLENGES

Legacy infrastructure.
Multiplicity of organizations with people on the factory floor.

Product Security

NEED

Securing the components and products throughout the manufacturing process, ensuring product security service-level agreements (SLAs) are met (high-margin devices, such as medical devices)

Securing the components and products throughout the manufacturing process (mid-level-margin, e.g., automotive)

Securing the components and products throughout the manufacturing process (low-margin devices, e.g., consumer)

CURRENT TECHNOLOGY STATUS

Solutions need optimization

Solutions not known

Solutions not known

GAP

Not all components can hold a “root of trust” in an economic manner

Not all components can hold a “root of trust” due to design constraints

CHALLENGE

 

 

Lack of compute and connectivity to support this

Many of the issues identified and discussed above can be addressed through the adaptation and deployment of standard IT security solutions to the factory floor environment. Often this is more of a cultural and business challenge than a technical one. This is reflected in Table 2 below.

However, there are two outstanding technical challenges that require additional development, as follows:

  1. There is a tension between securing data, e.g., during transmission, and its validation and use―the latter requires transparency at the cost of security.

  2. Product security from design through to deployment is a major complex area beyond the scope here. However, even just ensuring product security in a smart manufacturing environment is increasingly difficult due to the wide variety of hardware and software components. In particular, building security measures into low-margin, high-volume products is often challenging due to design constraints.

Approaches to Address Needs, Gaps and Challenges

Table 2 considers approaches to address the above needs and challenges. The evolution of these is projected out over a 10-year timeframe using technology readiness levels (TRLs).

In-table color key

Range of Technology Readiness Levels

Description

2

TRL: 1 to 4

Levels involving research

6

TRL: 5 to 7

Levels involving development

9

TRL: 8 to 9

Levels involving deployment

Table 2. Security: Potential Solutions for the Factory Floor

 

 

EXPECTED TRL LEVEL*

TECHNOLOGY ISSUE

POTENTIAL SOLUTIONS

TODAY

(2023)

3
YEARS

(2026)

5
YEARS

(2028)

10
YEARS (2032)

Security Management and Automation

 

Vendor-specific implementation of automated management of security-related process and operations

 5

 8

 9

 9

 

Likely consolidation in the industry but will result in multiple centers of gravity.

 

 

Standards for automated management of security-related process and operations

4

6

8

9

No standards in place. Government regulation or buying power may force issue.

Work amongst competing organizations and  geo-dominated bodies begins.

Possible standards established through National Institute of Standards and Technology (NIST) or others like entities.  Adoption likely fractured along incentivizing organizations.

Common standards compliance found in security tools.

Secure Data

[Data at rest] Tools for automated classification, flagging and tagging

7

9

9

9

[Data at rest] QR coding to hide info on paper

 8

 9

 9

 9

[Data in motion] Adapt and reuse defensible network design principles from highly automated and instrumented parts of the industry, e.g., front-end semiconductor fab

8

8

9

9

[Data in motion] Canaries5 to track data flows (end node is networked)

7

7

9

9

[Data in motion] Leak detection and sourcing tools

6

7

9

9

[Data at work] Adapt, reuse and expand existing IT security standards for software bill of material (SBOM) as applied to SW in manufacturing equipment

8

8

8

9

[Data at work] Adapt and reuse and expand existing IT security standards for SBOM as applied to SW components for products

8

9

9

9

Product Security

Expand trusted platform module (TPM) concepts of identity to components/parts, from equipment and computers

6

8

9

9

Enterprise- and Ecosystem-Level Security

Securing “data in motion” is a primary concern. The need is to have complete validation of data flows both within an enterprise (logistics, manufacturing, test) and between enterprises (throughout the supply chain), while ensuring security of that data. The usual tension exists between visibility and security.

In-enterprise data flows also need complete traceability (e.g., establishing data provenance), through the organization, but also across the product lifecycle. Inter-enterprise flows have additional concerns about IP-leakage, especially through inference across a variety of data sources.

Return to topic overview


References

  1. SEMI, “Specification for Cybersecurity of Fab Equipment,” SEMI E187-0122, 2022

  2. SEMI, “Specification for Malware Free Equipment Integration,” SEMI E188-0222, 2022.

  3. Chief Information Officier, U.S. Department of Defense, “CMMC Model”, https://dodcio.defense.gov/CMMC/Model/, 2023.

  4. National Institute of Standards and Technology, “The NIST Cybersecurity Framework 2.0 (Draft)“, https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd, 2023.

  5. Fortinet, “What is a Canary in Cybersecurity?”, https://www.fortinet.com/resources/cyberglossary/what-is-canary-in-cybersecurity, 2023.

 

Go to Security Introduction

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.