Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

Manufacturing and The Cloud – Navigating the Evolving Security Landscape

By Rob Janssens
August 23, 2018

The cloud, or Software-as-a-Service (SaaS), model is now nearly two decades old.  At first, manufacturers were scared to move their mission-critical data off-premise, but cloud companies adapted and instituted security measures to allay their fears. Despite the ever-evolving sophistication of hackers, security-conscious cloud providers now offer a far safer environment at a lower cost than most individual companies can provide for themselves.   

With these assurances and benefits, more and more manufacturers are looking to move their critical business processes to the cloud.   Here are the top security concerns they must consider and some suggestions on how cloud companies can address them.

Lack of Patching

Unpatched vulnerabilities on systems are the opening malicious hackers use to carry out the vast majority of hacks. Most exploits in today’s world involve vulnerabilities that were patched more than a year ago. It is challenging when you consider evolving technology – and the need for tools and the resources to use them – for manufacturers to keep a system patched.
Cloud providers should apply patches on a timely basis to reduce the likelihood of a breach. Many breaches take place simply because software providers do not apply patches on a timely basis. Responsible patching based on a mature vulnerability management protocol is critical to maintaining a safe environment.

Lack of Testing and Scanning

Manufacturers often do not have the expertise, time, tools or automated ways to conduct ongoing testing and scanning of systems. It does not make sense to wait until an attack happens to find out if defenses are strong enough.Cloud providers should operate a program to test defenses on a regular basis. Regular penetration and intrusion testing conducted by qualified/certified resources is important. Establishing a Vulnerability Management program is also a key to success. It is essential to not only test for vulnerabilities, but also to assess whether vulnerabilities are actually exploitable and what risks they represent (conduct ongoing risk assessment and analysis). Cloud providers should use vulnerability assessment tools and best practices that accommodate virtualization technologies, which are fundamental technologies for clouds. Such tools are capable of scanning physical and virtual environments. Furthermore, policies and procedures should be established regarding vulnerability testing, along with supporting processes and technical measures.

Immature Incident Security Response

Manufacturers are rightfully concerned that moving their data out of their physical premises and into the cloud makes that data vulnerable to a security breach. It's hard for them to trust someone outside the organization to prevent breaches and, just as importantly, to mitigate the damage if one occurs.  The effects of a data breach can be catastrophic to businesses of all sizes, not to mention the public relations nightmare and subsequent liability that can ensue when an organization drops the ball in the wake of a cyberattack.

Cloud companies should have a dedicated team with tested best practice processes (like NIST guidelines) and clear communication protocols to the incident response plan to detect breaches, and react quickly to initiate remediation in order to lower costs and impact. The incident security process must be linked to related processes for customer communication that tie into backup, recovery and disaster recovery processes. Continuity of systems must be guaranteed within a certain time so as to limit the impact on the user.

Knowledge of and Familiarity with Application ERP

Manufacturers have deep knowledge of ERP-related applications. Now with the ever-evolving complexity and demands around system security and changes in laws and regulations, the investment needed for cloud environment security and infrastructure management is a very costly combination.

A cloud security and management team deeply familiar with the applications a manufacturer uses often provides superior security than, for example, a managed service provider without the application familiarity. Cloud providers that understand the interdependencies between infrastructures, platform, app and configurations settings from a security and management perspective usually do a better job. Sharing the cost of hiring or outsourcing security experts and the related expertise can give cloud companies economies of scale.

Weak Access Controls

Access control gives a user who has a valid identity, and who has authorized rights and/or privileges, the ability to access and perform functions using information systems, applications, programs or files. The challenge today is that there are so many devices, computers, data sources and applications; it is difficult to develop a comprehensive approach to access control. The threat of unauthorized user accesses is a major risk to the availability, stability and quality (infrastructure and data) of the cloud system.

Users should only have access to the network and network services that they have been specifically authorized to use, based on least privileged principles. Access should be controlled by secure login procedures and restricted in accordance with developed, review and continuously improved access control policies, processes and implemented tools (like Privileged Access Management). Adopting regular user access reviews of move/add changes will control the access over time.

Lack of Confidence Due to New General Data Protection Regulations:

Lately governments and regions have instituted a variety of regulations that impose conditions on the safeguard and use of data. More recently, with the introduction of the EU General Data Protection Regulation (GDPR) regulation in combination with penalties for organizations who fail to sufficiently protect it. Any global organization will need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions as well as reputational damage and loss of customers due to privacy breaches.

Global manufacturers that operate in many countries and serve customers located in many countries need to stay abreast of individual country and regional regulations and gather regulatory intelligence. Data protection measures, like the new GDPR regulation which went into effect May 25, 2018, are becoming more important. Cloud providers will need to build a robust Information Security Management System (ISMS) based on security best practices (NIST) within the organization that meets internationally recognized data security standards like ISO 27001, CSA STAR certifications and SSAE18 SOC reports. This will help satisfy many data protection needs. Any cloud company that can share the applicable certifications and reports will underscore its ongoing commitment to ongoing security and compliance.

KEYWORDS: cloud security GDPR manufacturing security patch management security compliance software as a service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob Janssens is Senior Manager of Process and Compliance at QAD. He leads all process and compliance as well as certifications, continuous improvement and risk assessment. Rob’s passion is implementing and improving cloud security, process improvements and compliance. He believes that security is central to the success or failure of cloud solutions and that organizations must accept the evolving nature of a threat environment and constantly test and improve the security as the environment evolves. The focus should be on continually improving safety while reducing cost. Rob earned a master’s degree in Business Economics from Maastricht University in The Netherlands. He is Lean Business Process Certified (University of Michigan, USA), Certified Lead Auditor ISO 27001 and ISO 20000 (APMG & EXIN) and ITIL certified.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jeff Reich podcast news header

    Navigating the identity security landscape

    See More
  • White office room

    Navigating the security landscape: A guide to human-focused security

    See More
  • clothing on retail rack

    Navigating the complex security landscape of modern retail

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Complete Guide to Physical Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing