23 March 2023
Ensuring the security of connected objects and the protection of the data they exchange is becoming a vital issue for many companies. The loss of control over an object or the leaking of private data can quickly lead to dramatic consequences on the credibility of a product or service offering. Manufacturers have an important role to play in order to propose solutions adapted to security and data protection needs.
We interviewed our experts to find out more about the cybersecurity issues behind IIoT.
Digital Factory R&D Manager, LACROIX
Whether for domestic or professional use, it is estimated that by 2025, 75 billion objects will be connected to the internet. Smart light bulbs, predictive maintenance sensors on production lines, personal data collection systems and the likes are among the smart devices that make use of different network technologies (e.g. 4G, Wi-Fi, LoRa) to process, send, and analyze data.
In parallel to this growth in the production of connected objects, there is also a growing number of cyber attacks on these objects. Cyber attacks are estimated to have cost 5.5 billion euros. Data theft, taking control of devices, and interruption of services are just a few of many examples.
R&D Security Architect, LACROIX
Our role is to support our customers in the design of their IoT products by directly integrating cyber security, by:
This level of security must be maintained throughout the lifespan of an IoT product, from its design to its recycling, including its production and operation.
Focus on the “Secure by design” concept
A “secure by design” product means that risk and security are integrated at the design stage and throughout the product’s lifecycle. Its architecture is designed to be sufficiently robust to guarantee the security and confidentiality of software systems.
Source : Oracle
Digital Factory R&D Manager, LACROIX
Our product design strategy is based on the “Secure by Design” concept into 5 steps. It is essential to secure the design of your products as far upstream as possible.
We support our customers with risk analysis to fully understand the level of security to be implemented depending on the environment in which the product will operate.
We then define the hardware architecture solution (electronic, mechanical) and software adapted to our customers’ needs. We organize all our practices and processes around cyber security: code reviews, coding rules, crisis management plans, active monitoring of vulnerabilities, etc. These processes allow us to anticipate potential security threats. We address cyber security at the entire system level so as not to leave any weak links that could compromise the whole security chain.
With the production sites of the Electronics activity of LACROIX, we are fully able to support you with the manufacture of your IoT projects. We make it possible to connect with your PKI (Public Key Infrastructure), or that of LACROIX if you do not have one, in order to ensure solid authentication of products, right from the onset of factory production.
We also offer a generic and secure IoT platform that connects all IoT products produced by LACROIX. This platform has numerous advantages, particularly with regards to data collection and processing, secure firmware updates, certificate renewal, and industrial fleet management (device management).
The development of this IoT platform is at the heart of our “Secure by Design” strategy. Our versatile LX Connect platform offers you a turnkey solution to accelerate your IoT projects.
Discover in video an overview of our IoT platform
The final stage of our support is characterized by feedback on the overall IoT project. The aim is to listen to the customer’s feedback, and to pursue further developments if necessary.
As we all know, to ensure that an IoT project is secure and its data protected, it’s essential to ask the right questions, respect certain key rules and surround yourself with reliable partners. The sector is evolving very fast, which means keeping a close eye on technological and legal developments, particularly with the arrival of the CRA (Cyber Resilience Act), which is reshuffling the cards in cybersecurity. But that’s another story…
To know more about security and protecting connected objects
Find out this conference recorder during SIDO 2022 with the participation of 4 key speakers from IoT world: