Cyber Resilience Act (CRA) - no time to wait

Shownotes

More about the topic: https://www.boschrexroth.com/en/de/industries/hydrogen/ Do you already know the Rexroth blog

If you have any questions, please contact us: vertrieb@boschrexroth.de

Produced by Bosch Rexroth AG, Sales Europe Centre Susanne Noll

Transkript anzeigen

00:00:00: Hello, everybody and welcome to a new episode of our tech podcast by Bosch Rexroth.

00:00:08: My name is Robert Weber and today we are going to talk about the Cyber Resilience

00:00:12: Act and Cyber Security and I invited two guests.

00:00:17: One guest is Michael Langfinger.

00:00:18: Michael, welcome to the podcast.

00:00:20: Hi, Robert.

00:00:21: And Sebastian Krauskopf.

00:00:22: Sebastian, welcome to the podcast.

00:00:24: Hey, Robert.

00:00:25: Nice to be here.

00:00:26: Before we start, please introduce yourself briefly to the listeners.

00:00:30: Michael, first, please.

00:00:32: Yes, I'm the product owner of Cyber Security and also the product security officer of our

00:00:38: business unit, automation and electrification.

00:00:41: So very long introduction.

00:00:44: So maybe let me split it up into the product owner part.

00:00:47: This means that my team and I, we are developing the base security framework of Control XOS

00:00:54: and as a product security officer, I'm responsible for multiple topics, mostly ensuring that

00:01:00: all the security requirements are fulfilled in our development, raising awareness in the

00:01:05: company or in the business unit in this case and yes, also providing technical tools and

00:01:10: methods to our colleagues.

00:01:12: Okay.

00:01:13: Thanks, Michael.

00:01:14: Sebastian.

00:01:15: Yeah, I'm the lead software architect with the focus of the control platforms of Contra

00:01:18: X automation.

00:01:19: So this means I'm responsible for the design of our control hardware, Control X core and

00:01:24: our software platform, Control X OS and the corresponding apps.

00:01:30: And at the same time, I take care of the software development process.

00:01:33: So that means the process of making software designs, creating architectural documentation,

00:01:39: testing software and delivering software.

00:01:42: So Cyber Security and the Cyber Resilience are huge topic in the whole industry.

00:01:47: From my point of view, modern automation system consists of large number of network connections,

00:01:53: connected machines, industry 4.0 is a huge topic.

00:01:58: Cyber attacks in industry runs into billions of damage caused by cyber attacks and then

00:02:03: we have some regulation topic, Cyber Resilience Act for every product that can communicate

00:02:10: with another product.

00:02:12: So when you talk to your customer, Sebastian, what are the biggest misconceptions?

00:02:17: When it comes to the cyber security in automation?

00:02:20: Well, at the beginning, many people for them, Cyber Security was only about encryption of

00:02:27: communication protocols, what it was in their mind.

00:02:30: But of course, this is not sufficient.

00:02:32: As we all know, it's not only about the objective of privacy, but it's also about to improve

00:02:38: the availability of an automation system or to ensure the platform integrity.

00:02:44: And also an assumption is often that security can be implemented in a single feature in

00:02:49: a single component and then I'm done.

00:02:51: It's not so easy.

00:02:53: So it would be like saying if the security lock on my front door of my house is big enough,

00:03:00: then I'm done.

00:03:01: But of course, this is not the case.

00:03:03: What are you tired of hearing?

00:03:05: I'm actually tired of hearing that Cyber Security is not part of my business.

00:03:11: I don't need to care about Cyber Security.

00:03:13: Do you still hear that?

00:03:14: Yes, indeed.

00:03:16: We still have talks where we hear on the one side that it's not my deal or what we also

00:03:22: often hear, but this is getting better is about people who not yet really looked into

00:03:28: it, who just start to look into what does this mean for me.

00:03:32: But time is ticking, right?

00:03:33: Yes, that's true.

00:03:35: Time is ticking.

00:03:36: In 2027, there will be the enforcement of the Cyber Resilience Act and I can only encourage

00:03:43: everyone, every machine builder to really have a look into this, to build a Cyber Security

00:03:48: strategy to be prepared.

00:03:51: What are the biggest obstacles for your customers?

00:03:55: Actually where do they need help?

00:03:58: The new thing for them is that the first time the security is something which affects the

00:04:05: whole life cycle of the product of the machine.

00:04:09: So it does not end with the commissioning of the machine.

00:04:12: The machine is gone, sold to the customer, everything works, I'm done.

00:04:16: But now it still can be, there will be a vulnerability years after the machine has been deployed to

00:04:22: the plant and you need to do a software update to fix a vulnerability even if the machine

00:04:30: is working perfectly.

00:04:32: You mentioned already the Cyber Resilience Act in 27, everybody needs to fulfill the

00:04:36: regulation of the Cyber Resilience Act.

00:04:39: But the Cyber Resilience Act, is it a baseline or do you offer more to your customer when

00:04:44: it comes to Cyber Security?

00:04:47: Well the Cyber Resilience Act is the first time where we have a regulatory list of requirements

00:04:53: that you need to fulfill in order to sell your product.

00:04:57: But of course for us Cyber Security is more, our ambition is also to provide more than what

00:05:03: the Cyber Resilience Act requires.

00:05:05: This means we have additional apps, we have additional features which really go beyond

00:05:09: the Cyber Resilience Act.

00:05:10: Michael, can you go a little bit deeper, what means "beyond"?

00:05:13: Yeah, of course when we started developing Control X OS, the Cyber Resilience Act was not

00:05:19: even, nobody could foresee that obviously.

00:05:22: So this has not been on our mind.

00:05:24: But of course we had to for example align to already existing standards to mention one

00:05:29: would be the IEC62443, to which we have also certified our Control X OS.

00:05:35: So we have already.. certified by who?

00:05:38: By TÜV in this case.

00:05:40: So we have quite some requirements already fulfilled on the one hand side.

00:05:46: But of course, as Sebastian mentioned, the ambition is not to only fulfill the bare minimum

00:05:52: that you must fulfill to bring your product to the market, but to offer our customers

00:05:57: solutions that they can use to improve their security as well, so that they can profit from

00:06:00: our expertise.

00:06:01: Can you share three?

00:06:02: Yeah, of course, for example, the base system brings a lot of security functionalities already

00:06:08: now that are more than the CRA demands where you can benefit from, for example, if you

00:06:14: use Control X OS on your device, if you sell a device with Control X OS, or if you use it in

00:06:19: your machine, even if you are developing an app for that.

00:06:23: So yeah, we have lots of benefits for different stakeholders, let's say.

00:06:27: You have different stakeholders.

00:06:28: That's important, I think, because you have maybe four stakeholders, right?

00:06:32: Yeah, around about, I would say.

00:06:34: I mean, in the end, obviously, the one that operates the machine is also a stakeholder

00:06:38: for us.

00:06:39: And as already mentioned, app developers, machine builders, other vendors, selling the

00:06:45: products, and they, like I said, they benefit from different functions that we provide.

00:06:50: How have you prepared for the Cyber Resilience Act, Sebastian?

00:06:57: Well, actually, even before the Cyber Resilience Act came up, Cyber Security was a very important

00:07:03: topic for us.

00:07:05: Control X OS and Control X Core are new platforms, pretty new platforms.

00:07:10: And our goal, our ambition was to create an automation product which combines the robustness

00:07:16: and the performance of an OT device with the flexibility and the connectivity of an IT

00:07:21: device.

00:07:22: So it was pretty clear for us that Cyber Security is an important, so to say, architectural

00:07:28: driver.

00:07:29: Cybersecurity by design.

00:07:31: Cybersecurity by design.

00:07:33: So we started right from the beginning with a secure engineering process.

00:07:38: We analyzed threats and risk, implemented countermeasures.

00:07:42: We applied principles like the defense in depth principle, which means that we have multiple

00:07:48: layers of defense mechanisms, like you can think of an onion, or in order to harden the

00:07:56: system and to make it as secure as possible.

00:07:59: Is that a USP you can sell on the market?

00:08:02: Yes, definitely.

00:08:03: We think so.

00:08:04: There is room and there are applications which highly benefit for it.

00:08:08: I mean, in the end, it's about creating availability to improve the overall availability of your

00:08:15: system.

00:08:16: And we see that the threats and the risk, they increase.

00:08:20: Michael, when we talk about Cyber Resilience Act, it's not about a product, right?

00:08:27: It's about the competence to build products on the regulation.

00:08:31: Yeah, exactly.

00:08:33: You do it once, for example, and you're done.

00:08:35: I mean, Sebastian mentioned a lot of very important topics that, of course, have to

00:08:39: be covered, especially coming back, for example, the defense in depth approach, which means

00:08:44: that to identify which layer of protection you need to implement, you have to think like

00:08:49: an attacker.

00:08:50: So this is something I would say that's...

00:08:52: How difficult is that for you and your team to think like an attacker?

00:08:56: I mean, if you design your system from scratch based on such assumptions, you get used to

00:09:02: that and it's part of your daily work.

00:09:04: But if you have not in the past considered this in a product development, and I would

00:09:08: assume that a lot of companies have not done this yet and are not doing this today, then

00:09:12: it's increasingly difficult to think so.

00:09:15: But this is one important competence that you have to learn as a company now, and you

00:09:20: have to keep on learning that.

00:09:22: So it must be part of your daily business to implement this in your daily work, let's

00:09:28: say.

00:09:29: So as one example, of course, you have to follow your secure coding guidelines, but it's more

00:09:35: than just developing...

00:09:36: something concentrating on one product or so.

00:09:39: It's, it's more, it's the whole life cycle you have to cover and you have to think of

00:09:43: this whole life cycle at the very beginning when you start developing the product to

00:09:48: have in mind that later on you must provide patches.

00:09:51: You must to have all these processes in place you need everything Sebastian mentioned.

00:09:55: So this is a huge paradigm shift, I would say.

00:09:58: I want to come back to your products.

00:10:01: You already mentioned Control X OS.

00:10:03: It's a Linux based operating system.

00:10:06: So it's an open source based system.

00:10:08: It's also a security topic, right?

00:10:10: To rely on an open source project.

00:10:12: Yeah, of course.

00:10:13: I mean, for almost all open source projects, they have been refued by lots and

00:10:19: lots of people over the time.

00:10:20: I mean, we're talking about projects like the Linux kernel or open SSL or similar projects.

00:10:25: They are not some smaller projects done by one or two people.

00:10:28: Those are huge projects used by huge companies.

00:10:31: So of course you benefit from the experience that's there in those projects.

00:10:36: And this is also something that's important.

00:10:38: We do not want to reinvent the wheel.

00:10:40: We want to base on established secure standards.

00:10:44: Establish IT standards.

00:10:46: Yeah, exactly.

00:10:47: I think that's what Sebastian I think mentioned before.

00:10:49: It's this kind of these worlds that already have started to merge, right?

00:10:54: The OT and the IT, you cannot separate them anymore.

00:10:58: And our goal is to use the benefits of the IT technologies also in the OT world.

00:11:03: And this, to my understanding, also involves all the security aspects, which

00:11:09: yeah, have not been a top priority in the past in OT.

00:11:12: Control X core is your control platform.

00:11:16: What is the added value in terms of security when it comes to control X core?

00:11:21: I mean, what you get is a part from obviously the software contracts as running on it.

00:11:28: You get hardware, which, for example, has a mechanism in place where you can detect

00:11:33: whether the case or the housing has been opened.

00:11:35: And of course you can use it.

00:11:37: It's an industrial grade hardware.

00:11:39: You can use it to, for example, build your own security gateway based on the control

00:11:44: X core, allowing you, in this case, as a machine builder to secure your whole machinery.

00:11:49: So you have also existing machines.

00:11:52: Yes, of course.

00:11:53: That's the idea behind it.

00:11:54: Okay.

00:11:54: You have a very flexible modular system, which brings everything with it and which

00:11:59: you can further extend to realize the security gateway in this case as an example.

00:12:04: You want to add something Sebastian?

00:12:05: Yeah, basically with control X core, you have an out of the box solution, a hardware

00:12:09: software platform, which is out of the box security certified.

00:12:12: And you can start using it, building your application right out of the box.

00:12:17: Let's talk a little bit about updates and patches.

00:12:21: What happens in the future?

00:12:23: What happens 27 when you have to update your machine, when you have to deliver patches?

00:12:29: How do you do that?

00:12:30: I mean, patches and updates, they are increasingly important because it's a security risk too.

00:12:37: Right?

00:12:37: Yeah, of course.

00:12:38: I mean, in the past, there was always the thinking I've now developed my, my machine.

00:12:43: I have shipped it to the customer and it's securely stashed away somewhere in some factory.

00:12:48: And it's not connected to the internet.

00:12:50: So everything is fine.

00:12:51: Exactly.

00:12:51: That's what's the, the perfect world, which I, in my opinion, never existed, but this

00:12:57: was the assumption.

00:12:58: And nowadays you want to connect those devices.

00:13:01: You want to get data out of them.

00:13:03: You want to work with this data, yeah, with AI model, things like that.

00:13:06: Do you want to process the data?

00:13:07: So you have to connect there.

00:13:08: And then of course, those devices must be secure as well.

00:13:12: And to keep them secure.

00:13:14: I mean, they can be secure, but the moment you ship them, it can happen.

00:13:19: And it happens on a daily basis that somebody discovers a vulnerability and then you're

00:13:23: forced.. which is good.

00:13:24: Yeah, of course.

00:13:25: That's a good thing.

00:13:26: So, but then you as a vendor, you're forced to provide those patches as soon as possible.

00:13:32: How fast do you need to deliver them?

00:13:34: I mean, it depends.

00:13:35: The CRA in this case, for example, just states that if you're becoming aware of an

00:13:40: availability that's being exploited, then you have to react very quickly.

00:13:44: So you have to give a first analysis, I would say in 24 hours even.

00:13:48: So that's very quick.

00:13:49: I mean, of course, we're able to actually ship updates that takes a while.

00:13:54: You have to test them, but you have to also provide to your customers the information.

00:13:59: Okay, what can they do until the patches were available, for example?

00:14:02: So that's more than just providing the technical patch.

00:14:05: And so, yeah.

00:14:07: Yeah.

00:14:07: And I mean, our part here is to make the life easier for our customers.

00:14:10: I mean, think how you applied patches back then in Windows 95 and how easy, how

00:14:15: automatically this is now done on your smartphone.

00:14:17: And the same is true for Control-X OS, where we apply basically security patches as

00:14:22: simple as on your smartphone.

00:14:24: I mean, we even provide the portal for you if you want to use that.

00:14:28: The Control X device portal in this case allows you to deploy and ship patches

00:14:32: easily to your machines as a fleet management, defining when you want to

00:14:36: distribute them, update them.

00:14:38: So you can have this in a very easy way.

00:14:40: But if you say no, that's not what I want to do.

00:14:43: I want to integrate this into my own update management tooling.

00:14:48: That's also no problem because the interfaces are there.

00:14:50: They are open.

00:14:51: You can use them easily.

00:14:53: Can you please share what are your two big misconceptions or errors in reasoning

00:15:00: when it comes to the Cyber Resilience Act?

00:15:02: Maybe two of Michael, one of Sebastian.

00:15:05: What are the biggest misconceptions?

00:15:07: I mean, what I often hear is, yeah, I can be relaxed because it does not affect me.

00:15:13: I'm just providing the sensor here that grabs some digital data and transforms them.

00:15:18: But that's actually not the case.

00:15:21: I mean, also sensor is a digital component.

00:15:23: So I have to take care of that as well.

00:15:25: Sebastian, you want to share your biggest misconception?

00:15:28: The biggest misconception is at the moment that there is still time left.

00:15:33: This is not true.

00:15:34: The clock is ticking.

00:15:35: You have to get your cybersecurity strategy.

00:15:38: Now you need to be prepared.

00:15:40: Twenty twenty seven, the regulatory will go live.

00:15:44: So we talked a lot about the Cyber Resilience Act.

00:15:47: What do you offer to machine building companies with a whole existing machine

00:15:54: park when it comes to cybersecurity?

00:15:56: Is there also solutions for them?

00:15:58: Yeah, of course.

00:16:00: And that's one thing I like a lot about Control X OS.

00:16:03: And in this case, Control X Core, because you can realize so many different use cases.

00:16:09: And this case, talking about machine builders or existing machines, what you often need

00:16:14: I'm already know is a security gateway.

00:16:17: So why not take your Control X Core and make a security gateway out of it using the existing apps?

00:16:23: So you have this solution bundle, let's say, which is combined of the firewall app,

00:16:29: the VPN app and the security scanner, for example, that you can use to

00:16:33: place it at the edge of your machine to protect all the components that are

00:16:37: at the legacy components, brownfield devices that are not secure.

00:16:40: So yeah, use the firewall to protect access to them to control data that is transmitted there.

00:16:47: You have your VPN for security mode maintenance.

00:16:50: And you, in this case, you take the security scanner and you can even use that to have

00:16:56: an overview about all the components in there.

00:17:00: And especially not only an overview, you get a detailed overview about the security status.

00:17:04: So you can easily determine, hey, there is suddenly a new device in there.

00:17:09: There is a device doing things I do not expect.

00:17:12: And you get a result as a really good comprehensive report that can also be read

00:17:19: and interpreted by, let's say, a non expert, somebody not from the field of cybersecurity.

00:17:25: At the end, Michael, let's talk about your favorite security features apps when it

00:17:31: comes to control X core.

00:17:33: I would say one of the biggest features that I really like is the flexibility and the

00:17:39: choices that I have when using Control X OS in this case.

00:17:43: So, for example, with the security apps, I can install Control X OS on my device or I

00:17:49: take a Control X Core and then I can decide what I'm going to do with it.

00:17:53: For example, I could decide I take the security scanner and I use this to make

00:17:59: an inventory of my machine.

00:18:01: So then I have a nice looking, easy readable report even for somebody

00:18:06: which is not a security expert.

00:18:07: And I'm very quickly able to determine whether I might have a problem in my machine or not.

00:18:13: So it's extremely simple to fulfill such a use case.

00:18:16: And Sebastian, what are your favorite security features or apps?

00:18:20: I think my highlight is actually how nicely it integrates and how good the

00:18:25: ease of use over all ease of use still is of the system.

00:18:28: Often I hear the misconception that security would be bad for also for the

00:18:34: performance of a system or it would be bad for the usability of the system.

00:18:37: And I think my highlight is that it really nicely integrates in the overall

00:18:42: experience without getting in your way of being productive.

00:18:46: Thank you.

00:18:47: That is a good ending.

00:18:48: Thanks a lot, Michael.

00:18:49: Thanks a lot, Sebastian.

00:18:51: For talking, for explaining us Cyber Security, Cyber Resilience Act and

00:18:55: everything around this whole big topic when it comes to industrial automation.

00:18:59: Thanks a lot.

00:19:00: Thank you.

00:19:01: It was a pleasure

00:19:01: Thank you, Robert.

00:19:02: [MUSIC PLAYING]

00:19:05: [MUSIC PLAYING]

00:19:09: [music fades out]

00:19:11: [Choir Chimes]

Neuer Kommentar

Dein Name oder Pseudonym (wird öffentlich angezeigt)
Mindestens 10 Zeichen
Durch das Abschicken des Formulars stimmst du zu, dass der Wert unter "Name oder Pseudonym" gespeichert wird und öffentlich angezeigt werden kann. Wir speichern keine IP-Adressen oder andere personenbezogene Daten. Die Nutzung deines echten Namens ist freiwillig.