Cybersecurity in Machinery Regulation

What is Cybersecurity?

Cybersecurity refers to the practice of protecting systems, networks, and data from cyber attacks, unauthorized access, and damage. With more devices connected to the internet, from smartphones to industrial machinery, ensuring robust cybersecurity measures is crucial to safeguard sensitive data and operational integrity. The increased use of machinery operated with safety software and remote connections can lead to hazardous situations if vulnerabilities are exploited.

Why Cybersecurity is important for machinery ?

Cybersecurity is critical for machinery because modern equipment often relies on interconnected digital control systems that, if compromised, can lead to dangerous malfunctions. Regulation (EU) 2023/1230 explicitly addresses this through essential requirements such as:

  • Annex III, paragraph 1.1.9 Protection against corruption, which mandates that machinery software must be protected from intentional or unintentional corruption.
  • Additionally, Annex III, paragraph 1.2.1 Safety and reliability of control systems, requires that control systems function correctly under all foreseeable conditions, including cybersecurity threats.

A breach could result in unauthorized commands, disabling of safety functions, or manipulation of critical data posing serious risks to both operators and the environment. The following section lists the detailed requirements for each aspect.

Protection against corruption:

  1. Machinery should be designed so connecting to other devices doesn't cause any danger.
  2. Hardware sending important signals or data must be protected from tampering.
  3. The machinery should track any changes made to hardware used to connect to a software component that is critical for the compliance.
  4. Important software and data should be clearly marked and protected from being altered.
  5. The machinery should be able to show what software is installed to ensure safe operation.
  6. The machinery should track any changes or tampering with the software.
*Annex III paragraph 1.1.9 (EU) 2023/1230

Safety and reliability of Control systems

The overall system and machinery should be immune of:

  1. Operating stresses, external influences, and malicious attempts that could lead to hazardous situations.
  2. Faults in hardware or logic that could cause dangerous outcomes.
  3. Logic errors in the control system that may result in hazards.
  4. Unsafe modifications to safety settings or rules, including during learning phases.
  5. Human errors during operation that could create hazardous situations.
  6. Data loss related to safety software interventions, with logs maintained for five years.

Systems with self-evolving behaviour or logic that are designed to operate with varying levels of autonomy should not:

  1. Perform actions beyond their defined tasks or movement limits.
  2. Contain gaps in recording safety-related decision-making data. Data should be retained for one year.
  3. be unable to correct itself to maintain safety.

Additionally, the system should be immune to:

  1. Unexpected starts of machinery.
  2. Uncontrolled changes in parameters that may lead to hazards.
  3. Unsafe modifications to settings or rules during operation or learning phases.
  4. Failure to stop machinery when a stop command has been issued.
  5. Falling or ejecting of any moving part or object held by the machinery.
  6. Preventing the stopping of moving parts, whether automatic or manual.
  7. Failure of protective devices to function or send stop commands.
  8. Inconsistent application of the safety control system across all parts of the machinery assembly.

Wireless control system should be safe from:

  1. Communication or connection failures that may result in hazardous situations.

Key Components and Practical Implementation of Cybersecurity

*Annex III paragraph 1.2.1 (EU) 2023/1230

Essential steps to address IT-security over the whole life cycle of the machine

  1. Identify – Determine potential IT-security threats, vulnerabilities, and critical assets.
  2. Protect – Implement countermeasures to prevent or minimize the impact of security attacks.
  3. Detect – Establish measures to quickly identify the occurrence of IT-security incidents.
  4. Respond – Take action to contain, mitigate, and recover from detected security incidents.
  5. Recover – Restore systems and operations affected by security incidents to normal functioning.

The Future of Cybersecurity

As technology continues to evolve, so do cyber threats. Staying ahead of these risks demands constant vigilance, adaptability, and a proactive approach to security. To better understand the landscape of cybersecurity, two key regulations currently shape the framework:

  • REGULATION (EU) 2019/881 (Cybersecurity Act)
  • REGULATION (EU) 2024/2847 (Cyber Resilience Act)

By embedding robust cybersecurity practices into your daily operations and staying alert to emerging threats, you can better safeguard your interconnected digital life.


Stay secure and informed!

*ISO/TR 22100-4 2023/1230

Copyright © 2022-2024 Semmel S.R.L.