Industrial IoT Security: Best Practice for Authentication - Henrike Gerbothe - IoT & Edge Days 2022
Henrike Gerbothe and Jürgen Fitschen speak at IoT & Edge Days 2022
Get Social!
Follow us on Twitter:https://twitter.com/EclipseIoT
Follow us on LinkedIn: https://www.linkedin.com/showcase/eclipse-iot
Like us on Facebook: https://www.facebook.com/eclipseiot/
Tag us: #EclipseFdn #EclipseIoT
Website: https://iot.eclipse.org/
Locally or globally networked industrial automation applications can be functionally assigned to the Internet of Things (IoT). On the one hand, they are now also exposed to the same risks of possible cyberattacks as millions of other IoT applications. On the other hand, with regard to the cyber security protection of such applications, they can also refer to standards and norms such as ETSI EN 303 645, NITSIR 8259, and IEC 62443. In the past, many IoT devices were provided with universal usernames and passwords (such as "admin,"admin") by the manufacturers to make initial commissioning easier. The lecture provides some standard-compliant examples with safe but still user-friendly methods that should be used instead. One of them is based on QR codes and a special out-of-band channel technique. One other uses FIDO2 compatible hardware tokens.