The further advancement of society will require to fuse technologies of the real (physical) and virtual (cyber) worlds, and need the unfettered distribution of data, the use of open industry infrastructure, and globalization. Until now, industrial infrastructure control systems (OT) such as social infrastructure and factories have used closed networks, proprietary protocols, and proprietary platforms. In recent years, though, this closed world has been changing. Control systems are becoming more open for the purpose of reducing a cost adopting the common technology such as the general-purpose OS and protocols, utilizing the enormous amount of data in industrial infrastructure as an effective management resource and improving such as a productivity. While this use of open control systems has many potential benefits, it is also resulting in a steadily growing number of cyber-attacks on the industrial infrastructure where control systems and information systems (IT) are connected to the internet.
Some of these cyber-attacks shut down important industrial infrastructure, and the number of these incidents, which have a major impact on our lives, is on the rise. However, the security measures for them have been still under developing. There are several reasons for this.
First, many of these systems present technical challenges. For example, although the use of general-purpose operating systems and protocols is on the rise, many systems still use proprietary technologies that must be accommodated on an individual basis. Also, for systems which cannot be stopped, maintenance must be performed while the systems are still running. There are also operational difficulties. In some operation structures, engineers cannot be assigned for both control systems and security, so if a system abnormality occurs, it is not possible to make immediate decisions regarding how to respond. Also, control system lifecycles tend to be long, making it difficult to rapidly respond to evolving attacks.
Around the world, security regulations are being strengthened to counter the threats posed by cyber-attacks. In Japan, as well, related ministries, coordinated by the National center of Incident readiness and Strategy for Cybersecurity (NISC), are making progress with the development of cyber-security regulations in individual industrial fields. These regulations require secure operation throughout system lifecycles.
To meet these regulatory requirements and keep pace with global trends, the Toshiba Group is strengthening its security approaches and product security. It is leveraging its years of security experience and expertise to enhance security services for the control systems used in industrial infrastructure. We have recently fielded a growing number of consultation requests from customers concerning system operation and monitoring, so we have developed support systems and services that meet these needs (Fig. 1).