Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

Manufacturing and The Cloud – Navigating the Evolving Security Landscape

By Rob Janssens
infrastructure 1 responsive default security
August 23, 2018

The cloud, or Software-as-a-Service (SaaS), model is now nearly two decades old.  At first, manufacturers were scared to move their mission-critical data off-premise, but cloud companies adapted and instituted security measures to allay their fears. Despite the ever-evolving sophistication of hackers, security-conscious cloud providers now offer a far safer environment at a lower cost than most individual companies can provide for themselves.   

With these assurances and benefits, more and more manufacturers are looking to move their critical business processes to the cloud.   Here are the top security concerns they must consider and some suggestions on how cloud companies can address them.

Lack of Patching

Unpatched vulnerabilities on systems are the opening malicious hackers use to carry out the vast majority of hacks. Most exploits in today’s world involve vulnerabilities that were patched more than a year ago. It is challenging when you consider evolving technology – and the need for tools and the resources to use them – for manufacturers to keep a system patched.
Cloud providers should apply patches on a timely basis to reduce the likelihood of a breach. Many breaches take place simply because software providers do not apply patches on a timely basis. Responsible patching based on a mature vulnerability management protocol is critical to maintaining a safe environment.

Lack of Testing and Scanning

Manufacturers often do not have the expertise, time, tools or automated ways to conduct ongoing testing and scanning of systems. It does not make sense to wait until an attack happens to find out if defenses are strong enough.Cloud providers should operate a program to test defenses on a regular basis. Regular penetration and intrusion testing conducted by qualified/certified resources is important. Establishing a Vulnerability Management program is also a key to success. It is essential to not only test for vulnerabilities, but also to assess whether vulnerabilities are actually exploitable and what risks they represent (conduct ongoing risk assessment and analysis). Cloud providers should use vulnerability assessment tools and best practices that accommodate virtualization technologies, which are fundamental technologies for clouds. Such tools are capable of scanning physical and virtual environments. Furthermore, policies and procedures should be established regarding vulnerability testing, along with supporting processes and technical measures.

Immature Incident Security Response

Manufacturers are rightfully concerned that moving their data out of their physical premises and into the cloud makes that data vulnerable to a security breach. It's hard for them to trust someone outside the organization to prevent breaches and, just as importantly, to mitigate the damage if one occurs.  The effects of a data breach can be catastrophic to businesses of all sizes, not to mention the public relations nightmare and subsequent liability that can ensue when an organization drops the ball in the wake of a cyberattack.

Cloud companies should have a dedicated team with tested best practice processes (like NIST guidelines) and clear communication protocols to the incident response plan to detect breaches, and react quickly to initiate remediation in order to lower costs and impact. The incident security process must be linked to related processes for customer communication that tie into backup, recovery and disaster recovery processes. Continuity of systems must be guaranteed within a certain time so as to limit the impact on the user.

Knowledge of and Familiarity with Application ERP

Manufacturers have deep knowledge of ERP-related applications. Now with the ever-evolving complexity and demands around system security and changes in laws and regulations, the investment needed for cloud environment security and infrastructure management is a very costly combination.

A cloud security and management team deeply familiar with the applications a manufacturer uses often provides superior security than, for example, a managed service provider without the application familiarity. Cloud providers that understand the interdependencies between infrastructures, platform, app and configurations settings from a security and management perspective usually do a better job. Sharing the cost of hiring or outsourcing security experts and the related expertise can give cloud companies economies of scale.

Weak Access Controls

Access control gives a user who has a valid identity, and who has authorized rights and/or privileges, the ability to access and perform functions using information systems, applications, programs or files. The challenge today is that there are so many devices, computers, data sources and applications; it is difficult to develop a comprehensive approach to access control. The threat of unauthorized user accesses is a major risk to the availability, stability and quality (infrastructure and data) of the cloud system.

Users should only have access to the network and network services that they have been specifically authorized to use, based on least privileged principles. Access should be controlled by secure login procedures and restricted in accordance with developed, review and continuously improved access control policies, processes and implemented tools (like Privileged Access Management). Adopting regular user access reviews of move/add changes will control the access over time.

Lack of Confidence Due to New General Data Protection Regulations:

Lately governments and regions have instituted a variety of regulations that impose conditions on the safeguard and use of data. More recently, with the introduction of the EU General Data Protection Regulation (GDPR) regulation in combination with penalties for organizations who fail to sufficiently protect it. Any global organization will need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions as well as reputational damage and loss of customers due to privacy breaches.

Global manufacturers that operate in many countries and serve customers located in many countries need to stay abreast of individual country and regional regulations and gather regulatory intelligence. Data protection measures, like the new GDPR regulation which went into effect May 25, 2018, are becoming more important. Cloud providers will need to build a robust Information Security Management System (ISMS) based on security best practices (NIST) within the organization that meets internationally recognized data security standards like ISO 27001, CSA STAR certifications and SSAE18 SOC reports. This will help satisfy many data protection needs. Any cloud company that can share the applicable certifications and reports will underscore its ongoing commitment to ongoing security and compliance.

KEYWORDS: cloud security GDPR manufacturing security patch management security compliance software as a service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob Janssens is Senior Manager of Process and Compliance at QAD. He leads all process and compliance as well as certifications, continuous improvement and risk assessment. Rob’s passion is implementing and improving cloud security, process improvements and compliance. He believes that security is central to the success or failure of cloud solutions and that organizations must accept the evolving nature of a threat environment and constantly test and improve the security as the environment evolves. The focus should be on continually improving safety while reducing cost. Rob earned a master’s degree in Business Economics from Maastricht University in The Netherlands. He is Lean Business Process Certified (University of Michigan, USA), Certified Lead Auditor ISO 27001 and ISO 20000 (APMG & EXIN) and ITIL certified.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data center

    Navigating the US data privacy landscape in 2023

    See More
  • open laptop with code in dark room

    Navigating the threat landscape: The growing menace of cybercrime

    See More
  • Computer open on desk beside cell phone

    Navigating the regulatory and compliance landscape of 2025

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!