Cyber Risks in Additive Manufacturing Threaten to Unravel the Digital Thread

Similar documents
Policy Perspective: The Current and Proposed Security Framework

Smart Manufacturing Technology: What It Means to the Future of Business

Leveraging Technology to Find New Pathways for Business Growth

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Internet 2020: The Next Billion Users

ITI Comment Submission to USTR Negotiating Objectives for a U.S.-Japan Trade Agreement

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE S: Microelectronics Technology Development and Support (DMEA) FY 2013 OCO

Laser marking considerations for cosmetics, personal and home care producers. Achieve higher uptime, reduce maintenance, and improve mark legibility

Sustainable development

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Interagency Working Group on Import Safety. Executive Order July 18, 2007

Convergent Strategy for M2M Networks and Opportunities

Program Automotive Security and Privacy

NCD RO HDX Robust 50mm Transponder

all inkjet printers think this way since changing the ink in the machine is a timeconsuming

Telecom scenarios for the 4th Generation Wireless Infrastructures

FOREST PRODUCTS: THE SHIFT TO DIGITAL ACCELERATES

Challenges and Opportunities

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

SUSTAINABILITY MATERIALITY OVERVIEW

Globalisation increasingly affects how companies in OECD countries

Industrial Revolutions

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY

HOW AI BOOSTS INDUSTRY SPOTLIGHTS INDUSTRY PROFITS AND INNOVATION

APX TM TWO-WAY RADIOS NORTH AMERICA REGION. MotorolaSolutions.com/Services

Telecommunications Regulation in Jamaica - the Challenges of New Technologies

Coatings technology overview

Breaking RSA semiprimes

DATA COLLECTION AND SOCIAL MEDIA INNOVATION OR CHALLENGE FOR HUMANITARIAN AID? EVENT REPORT. 15 May :00-21:00

The Trend Toward Digital: How DocuSign Can Help. DocuSign helps insurers improve the customer experience, lower costs, and grow their business

the Companies and Intellectual Property Commission of South Africa (CIPC)

Pan-Canadian Trust Framework Overview

Robotic automation goes mainstream: Accenture announces agreement with IPsoft

Question 1: Do you have any comments on our approach to this review?:

Standards Essays IX-1. What is Creativity?

Executive Summary. The process. Intended use

The BioBrick Public Agreement. DRAFT Version 1a. January For public distribution and comment

The 9 Sources of Innovation: Which to Use?

Anticipating the Broad Implications of Additive Manufacturing on Workforce Development and Education

The Case for ISO27001:2013

Applied Safety Science and Engineering Techniques (ASSET TM )

USTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET

ECE 480 Design Team 3 Design Issues. Power-over-Ethernet for Wireless Home Automation Sponsored by Texas Instruments

The Sherwin-Williams Company

Raw Materials: Study on Innovative Technologies and Possible Pilot Plants

Harnessing the 4th Industrial Revolution. Professor Mark Esposito Harvard University & Nexus

in the New Zealand Curriculum

Global Virtual Reality Market: Industry Analysis & Outlook ( )

Understanding Real-World Mobile Network Experience

Objectives, characteristics and functional requirements of wide-area sensor and/or actuator network (WASN) systems

LED Luminaires and Retrofit Bulbs Licensing Program. Lighting the way forward

Polycarbonate Datapage Security: Hinge Construction

Transmission Innovation Strategy

Technical Documentation

A Semiconductor Manufacturers Perspective on Obsolescence and Counterfeiting

NCD1015ZP 50mm Half Duplex Read-Only RFID Transponder Features Description Applications Ordering Information Part # Description Block Diagram

YOU CREATE. YOU INNOVATE. WE PROTECT.

The Geotechnical Data Journey How the Way We View Data is Being Transformed

April 21, By to:

Patents and climate change mitigation technologies - evidence to support policy

Nokia Technologies in 2016 Technology to move us forward.

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

Protection from electromagnetic environment effects

GENEVA COMMITTEE ON DEVELOPMENT AND INTELLECTUAL PROPERTY (CDIP) Fifth Session Geneva, April 26 to 30, 2010

Digital Engineering. Phoenix Integration Conference Ms. Philomena Zimmerman. Deputy Director, Engineering Tools and Environments.

By Mark Hindsbo Vice President and General Manager, ANSYS

Strategic Partner of the Report

Issues and Challenges in Ecosystems of Federated Embedded Systems

Societal Implications of Additive Manufacturing

Principles and structure of the technology framework and scope and modalities for the periodic assessment of the Technology Mechanism

Conflict Minerals Report

Technology Commercialization Primer: Understanding the Basics. Leza Besemann

UNITED STATES INTERNATIONAL TRADE COMMISSION WASHINGTON, DC 20436

Senior Design Projects: Sample Ethical Analyses

ACCELERATING TECHNOLOGY VISION FOR AEROSPACE AND DEFENSE 2017

MOBILIZE AND MAXIMIZE THE POTENTIAL OF P25 DIGITAL LMR

Active and intelligent fibrebased. Outlook from a brand owners perspective. Cost Action FP1405. Robert Witik and Alexey Vishtal

Instrumentation and Control

The PTR Group Capabilities 2014

Programs for Academic and. Research Institutions

Enabling a Smarter World. Dr. Joao Schwarz da Silva DG INFSO European Commission

Why patents DO matter to YOUR business

Driving Cost Reductions in Offshore Wind THE LEANWIND PROJECT FINAL PUBLICATION

DoD Electronics Priorities

Open Systems Architecture in DoD Acquisition: Opportunities and Challenges

2 LEADING IN THE NEW IN PUBLIC SAFETY

Managing Encryption. A guide for public safety decision makers. White Paper.

Transmission Innovation Strategy

Clean Coal Technologies

Intellectual Property

i) The continued priority to develop a sustainable maritime transportation system

Digital Nanoparticle Authentication

A WHITE PAPER BY SMITHERS PIRA, COMMISSIONED BY HP. Future of Inkjet Printing

Enforcement of Intellectual Property Rights Frequently Asked Questions

Trade Secret Protection of Inventions

Comparison: On-Device and Drive Test Measurements

Orion Master Data Workflow Article

This is simply, customers looking for businesses that service their local area. Businesses like yours.

Intellectual Property, Vaccine Production and Technology Transfer

Transcription:

SPOTLIGHT / COMMENTARY / FEATURE Cyber Risks in Additive Manufacturing Threaten to Unravel the Digital Thread By Simon Goldenberg and Mark Cotteleer Wherever data and information are transmitted, used, or accessed, companies must anticipate that someone, somewhere may try to exploit those data and information for personal gain, or to inflict harm or damage. For organizations deploying additive manufacturing (AM) technology, acknowledging this sad reality is not just a business imperative, but potentially a true matter of life and death. AM is one area where cyber risk poses an especially significant danger. Potential uses for AM span numerous industries as a way to address supply chain challenges associated with unpredictable inventory and expensive-to-produce parts in remote locations. However, the very nature of additive manufacturing technology-with its reliance on digital data files and connectivity to transmit them-leaves it open to significant security exposures, from product malfunctions to intellectual property theft and brand risk, along with other new threats conventional manufacturers may not face. 1

The data generated about an object during the AM design and production processes, for example, can be considerable, generating a strand of information that runs through the AM object s lifespan known as the digital thread. This digital threat holds a trove of technical and operational details of that product. So, if a digital design file is stolen or manipulated, the bad actors can do more than just reverse engineer and illegally manufacture and sell that part. With access to the full design file, hackers could conceivably build in failure points in critical components without the designers knowledge. To maintain the integrity of the AM supply chain, organizations must recognize that the intrinsic value of their business may be shifting from the end product to the information that enables that end product. The already complicated task of implementing a comprehensive AM cybersecurity protocol is further challenged by the broad reach of the AM supply chain, which extends from suppliers to owners, managers and purchasers of AM systems to distributors and purchasers of AM products. Every stage of the digital thread-design and scan, quality assurance and printing, in- 2

field operation and even disposal of 3D-printed objects or printers-is vulnerable to cyber threats. Cyber risk can impact each stage of the digital thread, from design and scan, to quality assurance and printing, to use in the field, and even disposal of the AM objects or printers. Value Shift To maintain the integrity of the AM supply chain, organizations must recognize that the intrinsic value of their business may be shifting from the end product to the information that enables that end product. Securing that value means they must think beyond the file itself and consider all the potential points of entry into the system, and throughout the digital thread, where information may be accessed by unauthorized parties. When one considers that the digital thread extends from design, build, and quality assurance monitoring to testing, delivery, and distribution, the enormity of the cybersecurity challenge in AM is unmistakable. Manufacturers can look to emerging standards to protect their AM processes during the build process. Leading practices are emerging in the area of tracking and tracing, including the use of RFID tags to track AM-produced products throughout the supply chain. Another promising development is the use of chemicals to apply unique identifiers to AM products; in one case, chemical tags were added to a composite during the build process. While the costs and business processes associated with using these emerging solutions need to be examined, they may show promise in terms of securing products throughout the supply chain and reducing 3

the likelihood of tampering, theft, and counterfeiting. Further, a robust quality assurance methodology can help organizations detect toolpath alterations or other misplacement of materials, among other structural adulterations. Steps Toward AM Cybersecurity 1. Conduct a thorough risk assessment: By doing so, it can pinpoint the risks most pertinent to its particular AM scenario, as well as any additional threats that might come into play as it explores other AM applications. This approach can, in turn, enable the organization to focus initial cybersecurity efforts on the highest-risk areas, and identify and prioritize the various points of vulnerability throughout the digital thread or digital Beyond adding traceable materials during the build process or monitoring quality assurance, organizations can consider putting measures in place to protect the machines themselves. AM printers often do not limit or control who uses them, or what objects are printed. Organizations using AM printers should adopt change management/control workflows for printers and objects, including reviews, and authorized approvals. This allows organizations to have some level of confidence that any objects printed comply with IP rights, license agreements, and other security concerns, as well as that viruses will not be introduced to impact the printer s function, as with Stuxnet s impact on centrifuges. AM organizations can model their approach to these workflows on those already in use for other technologies, such as change control boards or configuration control boards commonly used in software management. To ensure an AM printer prints only approved objects, the printer may be isolated on the network, with controls in place to make sure only approved designers can submit files directly to the printer. Overall, AM offers great promise in terms of democratizing and distributing manufacturing, reducing waste, and enabling rapid production of new and specialty products. There is much work to be done in terms of identifying comprehensive and sustainable AM cyber practices and promulgating them through standards and, where appropriate, additional regulation. Immediate steps such as conducting security risk assessment, developing mitigation plans, encrypting design files, protecting printers and educating stakeholders can go a long way toward understanding and addressing AM cybersecurity concerns now. Excerpted with permission from: Deloitte Insights: 3D opportunity and cyber risk management (https://www2.deloitte.com/insights/us/en/focus/3d-opportunity/3d-printing-cyber-riskmanagement.html) 4

i. Cotteleer, Trouton, and Dobner, 3D opportunity and the digital thread. ii. Sturm et al., Cyber-physical vulnerabilities in additive manufacturing systems. iii. Preeta M. Banerjee and Paul Sallomi, 3D opportunity for technology, media, and telecommunications: Additive manufacturing explores new terrain (http://dupress.com/articles/3d-printing-in-technology-media-telecom-tmt-industry/), Deloitte University Press, December 7, 2015. iv. Sturm et al., Cyber-physical vulnerabilities in additive manufacturing systems. Related Resources: Deloitte Video Series: (https://www2.deloitte.com/insights/us/en/learn/following-thedigital-thread.html) Following the digital thread Infographic: (https://www2.deloitte.com/insights/us/en/multimedia/infographics/trends-in-additive-manufacturing-patents.html) Trends in additive manufacturing patents Article: (https://www2.deloitte.com/insights/us/en/focus/3d-opportunity/national-security-implications-of-additive-manufacturing.html) Additive manufacturing considerations for national security Article: (https://www2.deloitte.com/insights/us/en/focus/3d-opportunity/additivemanufacturing-standards-for-3d-printed-products.html) 3d opportunity for standards: Additive manufacturing measures up MOOC: (https://www2.deloitte.com/insights/us/en/learn/3d-opportunity-additivemanufacturing-course.html) Additive manufacturing for business leaders IDC Forecast: (https://3dprintingindustry.com/news/idc-forecasts-worldwide-spending- 3d-printing-nearly-12-billion-2018-127237/) Worldwide Spending on 3d Printing to be Nearly $12 Billion in 2018 5