第1å EUã®IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹
ã¯ããã«
è¿å¹´ããã¾ãã¾ãªçµç¹ãå£ä½ããå¶å¾¡ç³»ã·ã¹ãã ã®ã»ãã¥ãªãã£ã«é¢ããã¬ã¤ãã©ã¤ã³ãå ¬éããã¦ãã¾ããå¶å¾¡ç³»ã·ã¹ãã ã®ã»ãã¥ãªãã£ã«é¢ããã¬ã¤ãã©ã¤ã³ã¯ãå¾æ¥ããNISTï¼ç±³å½ç«æ¨æºæè¡ç 究æï¼ãIECï¼å½éé»æ°æ¨æºä¼è°ï¼ãå ¬éãã¦ãã¾ãããIoTã®æ®åæ¨é²ã«ä¼´ããå¶å¾¡ç³»ã·ã¹ãã ããIIoTãï¼Industrial IoTï¼ã¨å¼ã°ããã±ã¼ã¹ãåºã¦ãã¦ãããããã¦æ³¨ç®ããã¦ãã¾ãã
欧å·ã§ã¯ããã§ã«ãã¤ãã§ã¯å¶å¾¡ç³»ã·ã¹ãã ãIoTãªã©ã«ãã製é æ¥ã®å¨ãæ¹ã«ã¤ãã¦ããã§ã«2011å¹´ããâIndustry 4.0âï¼Industrie 4.0ï¼ã¨ããã³ã³ã»ããã®ãã¨ãã¹ãã¼ãå·¥å ´ã®å®ç¾ãç®æãã¦ãµã¤ãã¼ãã£ã¸ã«ã«ã·ã¹ãã ã«åºã¥ã製é æ¥ã®ãã¸ã¿ã«åãå·¥å ´æ©å¨ã®ã¤ã³ã¿ã¼ãããã¨ã®é£æºãæ¨é²ãã¦ãã¾ãã
â» å¶å¾¡ç³»ã·ã¹ãã ã¯ããã®å
¨ä½ãä¸é¨ã«éããä»ã«ããã¾ãã¾ãªå¼ç§°ã使ããã¦ãã¾ãã
- ä¾ï¼ãç£æ¥å¶å¾¡ç³»ã·ã¹ãã ãããç£æ¥ç¨IoTãããICSãï¼Industrial control systemsï¼ããã¹ãã¼ãããã¥ãã¡ã¯ãã¥ã¢ãªã³ã°ãï¼Smart Manufacturingï¼ããCPSãï¼Cyber Physical Systemï¼ããOTãï¼Operational Technologyï¼
ã¹ãã¼ãããã¥ãã¡ã¯ãã£ãªã³ã°ï¼Smart Manufacturingï¼ã¨IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹
2018å¹´11æã«EUã®ã»ãã¥ãªãã£çµç¹ã§ããENISAï¼EUãããã¯ã¼ã¯æ
å ±ã»ãã¥ãªãã£æ©é¢ï¼ããå¶å¾¡ç³»ã·ã¹ãã ï¼IIoTã®ã»ãã¥ãªãã£å¯¾çéã¨ãã¦ã
ãGood practices for Security of Internet of Things in the context of Smart Manufacturingãï¼ã¹ãã¼ãããã¥ãã¡ã¯ãã¥ã¢ãªã³ã°ã®è¦³ç¹ã«ãããIoTã»ãã¥ãªãã£ã®ã°ãããã©ã¯ãã£ã¹ï¼
ãå
¬éãã¦ãã¾ããï¼ä»¥ä¸ãIIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ï¼
IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã¯ãã¹ãã¼ãããã¥ãã¡ã¯ãã£ãªã³ã°ã«å¿ è¦ãªIIoTã®ã»ãã¥ãªãã£ã確ä¿ããããã®æ¨å¥¨çãåéããé¢é£ããã»ãã¥ãªãã£ããã³ãã©ã¤ãã·ã¼ã®è å¨ããªã¹ã¯ãæ»æã·ããªãªãæããã«ãããã¨ã§ããããã«å¯¾ããEUå ¨ä½ã®ã»ãã¥ãªãã£æèãé«ãããã¨ãç®çã¨ãã¦ãã¾ããæ¬ã³ã©ã ã§ã¯ããã®IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®ãã¤ã³ãã«ã¤ãã¦è§£èª¬ãã¦ããã¾ãã
ãªããIIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã§ã¯ãIndustry 4.0ãã
ãIoTãªã©ã®æ°ãããµã¤ãã¼ãã£ã¸ã«ã«æè¡ãåãå
¥ãããã¨ã«ãã£ã¦ãçç£ã«ãããåæ£ææ決å®ãå¯è½ã«ããããã¸ã¿ã«åãããçµ±åãããã¹ãã¼ããªããªã¥ã¼ãã§ã¼ã³ã¸ã®ãã©ãã¤ã ã·ãããã¨å®ç¾©ãã¦ãã¾ãã
åæ£ææ決å®ã¨ã¯ã製é ã«ããã¦å¿
è¦ãªææ決å®ããä¸å¤®é権çã«è¡ãã®ã§ã¯ãªããåã
ã®è¦ç´ ï¼è£½é æ©å¨ãªã©ï¼ãã¨ã«èªå¾ãã¦è¡ããã¨ã§ãã
ã¾ããã¹ãã¼ãããã¥ãã¡ã¯ãã£ãªã³ã°ãã
ãä»å 製é ãé«åº¦ãªåæãIT/OTã®çµ±åãªã©ãIndustry 4.0ã«æºæ ããææ°ã®æ
å ±éä¿¡æè¡ãåºç¤ã¨ãã¦æ§ç¯ããã次ä¸ä»£ã®ç£æ¥è£½é ããã»ã¹ããã³ã·ã¹ãã ãã¨å®ç¾©ãã¦ãã¾ãã
ä»å 製é ï¼additive manufacturingï¼ã¨ã¯ã製åã«ææãä»å ããªãã製é ã»å å·¥ããé å½¢ã»å å·¥æ¹æ³ã®ãã¨ã§ãã
Industry 4.0ã¯ãã¹ãã¼ãããã¥ãã¡ã¯ãã£ãªã³ã°ã¨IIoTã®ä¸¡æ¹ãå«ãåºç¯ãªæ¦å¿µã§ãããIIoTã®å·¥å ´ç°å¢ï¼industry environmentï¼ã«é©ç¨ããããã®ã¨ãã¦ãã¾ãã
å³1ãã¹ãã¼ãããã¥ãã¡ã¯ãã£ãªã³ã°ãå®ç¾ããIIoTã¨ãã®ç¯å²
ENISAã§ã¯2017å¹´ã«IoTã®ã»ãã¥ãªãã£å¯¾çéãGood practices for Security of Internet of Thingsãï¼IoTã»ãã¥ãªãã£ã®ã°ãããã©ã¯ãã£ã¹ï¼ãå ¬éãã¦ãã¾ãï¼ä»¥ä¸ãIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ï¼ãâ» æ¬ã³ã©ã ã¯ã解説ã®ä¸é¨ã«ã¤ãã¦ãIIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã¨IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã¨ã®æ¯è¼ã交ãã¦ããã¾ãã
IIoTã®ã»ãã¥ãªãã£è å¨
IIoTã«ã¯ã©ã®ãããªã»ãã¥ãªãã£è å¨ãåå¨ããã®ã§ããããï¼ IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã§ã¯ãIIoTã¸ã®ã»ãã¥ãªãã£è å¨ã¨ãã¦29件ã®è å¨ãæãã¦ãã¾ãã
æªæã®ããæ´»åï¼æªç¨ |
|
---|---|
çè´ï¼ååï¼ãã¤ã¸ã£ã㯠|
|
ç©ççæ»æ |
|
æå³ããªãæ害ï¼å¶ç¶ï¼ |
|
æ éï¼èª¤åä½ |
|
åæ¢ |
|
æ³ä»¤ |
|
ç½å®³ |
|
å³2ãIIoTã®ã»ãã¥ãªãã£è å¨
å³ï¼ã®èµ¤æ é¨åã¯IoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã¨æ¯è¼ããå ´åã®IIoTç¹æã®è å¨ã§ããç¹ã«å¯ç¨æ§ãå®å ¨æ§ã«é¢ããè å¨ãã人çãã¹ãç©ççãªè å¨ãå¤ããå·¥å ´è¨åãæ£å¸¸ã«ç¨¼åãç¶ãããã¨ãé常ã«éè¦ãã¦ãããã¨ããããã¾ããï¼IoTç¹æã®è å¨ã®æ示ã¯æ示ãã¦ãã¾ããï¼
IIoTã®æ»æã·ããªãª
IIoTãæ»æãããå ´åãã©ã®ãããªæ»æã·ããªãªãæ³å®ãããã®ã§ããããï¼æ»æã®ã»ã¨ãã©ã¯å³ï¼ã®ãæªæã®ããæ´»å/æªç¨ãããçè´/åå/ãã¤ã¸ã£ãã¯ãããç©ççæ»æãã«å«ã¾ãã¾ãããå
·ä½çãªæ»æã®å¯¾è±¡ãæ段ã«ã¤ãã¦è¦ã¦ããããã¨æãã¾ãã
IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã§ã¯ãèæ
®ãã¹ã12ã®æ»æã·ããªãªã¨ãã®å½±é¿ã示ãã¦ãã¾ããIIoTããã¤ã¹ã«å¯¾ããæ»æãå¤ããã¨ã¨ãå¯ç¨æ§ãæãªãæ»æãå¤ããã¨ãåããã¾ãã
1. ã³ã³ããã¼ã©ã¼ï¼ä¾ï¼DCS,PLCï¼ã¨ã¢ã¯ãã¥ã¨ã¼ã¿ã®éã®æ¥ç¶ã«å¯¾ããæ»æ
2. ã»ã³ãµã«å¯¾ããæ»æï¼æ¸¬å®å¤ãç¶æ ã®å¤æ´ããããã®åæ§æãªã©ï¼
3. ã¢ã¯ãã¥ã¨ã¼ã¿ã«å¯¾ããæ»æï¼ç¶æ ã®æå¶ãè¨å®ã®å¤æ´ï¼
4. ãããã¯ã¼ã¯ãæµããæ å ±ã«å¯¾ããæ»æï¼ãã¼ã¿ã®æ¹ããï¼
5. IIoTã²ã¼ãã¦ã§ã¤ã«å¯¾ããæ»æï¼èå¼±ãªãããã³ã«ãããã©ã«ããã¹ã¯ã¼ããªã©ï¼
6. ãªã¢ã¼ãã³ã³ããã¼ã«ããã¤ã¹ã®ä¸æ£æä½ï¼ä¾ï¼æä½ããã«ãã¹ãã¼ããã©ã³ï¼
7. SISï¼å®å ¨è¨è£ ã·ã¹ãã ï¼ã«å¯¾ããæ»æ
8. ãã«ã¦ã§ã¢
9. ï¼IoTã®ï¼ããããããã«ããDDoSæ»æ
10. è¸ã¿å°æ»æï¼ä¾ãã°ã¯ã©ã¦ãã«å¯¾ããæ»æï¼
11. ãã¥ã¼ãã³ã¨ã©ã¼ãã¼ã¹ã®æ»æããã³ã½ã¼ã·ã£ã«ã¨ã³ã¸ãã¢ãªã³ã°æ»æ
12. AIæè¡ã使ç¨ããé«åº¦ã«å人åãããæ»æ
å³3ãIIoTã®æ»æã·ããªãª
IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®å ¨ä½å
ããã¾ã§è¦ã¦ããIIoTã¸ã®è
å¨ãæ»æã·ããªãªã«ã¯ã©ã®ãããªã»ãã¥ãªãã£å¯¾çãå¿
è¦ã«ãªãã®ã§ããããï¼IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã§ã¯ãã»ãã¥ãªãã£å¯¾çéã¨ãã¦110件ã®ã»ãã¥ãªãã£è¦ä»¶ãå®ç¾©ãã¦ãã¾ãã
大å¥ããã¨ãããªã·ã¼ï¼24è¦ä»¶ï¼ãçµç¹ç対çï¼27è¦ä»¶ï¼ãæè¡ç対çï¼59è¦ä»¶ï¼ã¨ãªãã¾ãã
å³4ãIIoTã»ãã¥ãªãã£è¦ä»¶ã®ã«ãã´ãª
æè¡ç対çã¨ããã¦ãããã®ãåå以ä¸ãå ãã¦ãã¾ããããã®ä¸ã«ã¯äºæ¥ç¶ç¶ã¨å¾©æ§ã®ããã«æè¡ã¨ããã¸ã¡ã³ãã®ä¸¡æ¹ã®å´é¢ãå«ã¾ãããã®ãããã¾ããã¾ããããã¨ã¯éã«ããªã·ã¼ã«ã¯è³ç£ç®¡çã®ããã«ä¸è¦ãã¦æè¡çå´é¢ã大ããããã«æããããã®ãå«ã¾ãã¦ãã¾ãããããã®å¯¾çã¯ãENISAã®ç¬èªã®è¦³ç¹ã ãã§ãªããä¸è¨ã®ç¥å度ã®ããã»ãã¥ãªãã£ã¹ã¿ã³ãã¼ããåç §ææ¸ã¨ããã¦ãã¾ãã
åç §ææ¸ï¼ä¸é¨æç²ï¼
- IECãIEC 62443-2-1:2010
- IECãIEC 62443-3-3:2013
- ISOãISO/IEC 27002:2013
- NISTãNIST SP 800 82r2
- NISTãNISTIR 8183
- Cloud Security AllianceãSecurity Guidance for Early Adopters of the Internet of Things
- IICãIndustrial Internet of Things Volume G4: Security Framework
- OWASPãIoT Security Guidance
- GSMAãGSMA CLP.13 IoT Security Guidelines for Endpoint Ecosystems
- IoT Alliance AustraliaãInternet of Things Security Guidelines v1.2
IIoTã¨IoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®éã
IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã«ã¯ã©ã®ãããªç¹å¾´ãããã®ã§ããããï¼IoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã¨æ¯è¼ãã¦ã©ã®ãããªã»ãã¥ãªãã£è¦ä»¶ãå¤ãã®ããè¦ã¦ã¿ã¾ãããã
â» ã«ãã´ãªã®æ¯è¼ã®ãããåå¥ã®ã»ãã¥ãªãã£è¦ä»¶ã¯ããªããããä¸è¨ã®å¯¾å¿é¢ä¿ã«ã¯ãªãã¾ããã
â» éã«åå¨ããªãããããã¯æ¸å°ããè¦ä»¶ã®æ示ã¯å²æãã¦ãã¾ãã
å³5ãIIoTè¦ä»¶ã®ãã¡ãIoTè¦ä»¶ã«å¯¾ãã¦è¿½å ããããã¯å¤§ããå¢å ããã«ãã´ãª
- IIoTã®ããªã·ã¼ã¯ãç¹ã«ãã©ã¤ãã·ã¼ã»ãã¤ã»ãã¶ã¤ã³ãè³ç£ç®¡çããªã¹ã¯ç®¡çããã³è å¨ã®ç®¡çã«ã¤ãã¦ã®è¦ä»¶ãå¤ãã§ããï¼ä¾ãã°ãå°åå ã®æ³è¦å¶ã¸ã®å¯¾å¿ï¼GDPRãªã©ï¼ãè³ç£ç®¡çãã¼ã«ã®å©ç¨ãããããã¦ã³ã¨ããã ã¢ããã®ãªã¹ã¯ç®¡çãªã©ã«ã¤ãã¦æ±ãã¦ãã¾ããï¼
- IIoTã®çµç¹ç対çã¯ãã¨ã³ããã¤ã³ãã©ã¤ããµã¤ã¯ã«ãã»ãã¥ãªãã£ã¢ã¼ããã¯ãã£ã¼ã®è¦ä»¶ãæ°ãã«å®ããããã¨å ±ã«ãã¤ã³ã·ãã³ããã³ããªã³ã°ã¨èå¼±æ§ç®¡çãåå²ããã¦å¥åã®ãã¼ãã«è¨å®ããã¦ãã¾ããï¼ä¾ãã°ãã¨ã³ããã¤ã³ãã®çºæ³¨ï½å»æ¢ã¾ã§ã®ã»ãã¥ãªãã£èæ ®ããã»ãã¥ãªãã£ã«é¢ããã»ãã¥ãªãã£ã¢ã¼ããã¯ãã£ã¼è¨è¨ãä¾µå ¥ãã¹ãã®å®æ½ãªã©ã«ã¤ãã¦æ±ãã¦ãã¾ããï¼
- IIoTã®æè¡ç対çã¯ãã¯ã©ã¦ãã»ãã¥ãªãã£ãäºæ¥ç¶ç¶ã¨å¾©æ§ãM2Mã»ãã¥ãªãã£ï¼ãã·ã³éã®ã»ãã¥ãªãã£ï¼ãæ§æ管çãæ°ãã«å®ããããã¨å ±ã«ãã½ããã¦ã§ã¢/ãã¡ã¼ã ã¦ã§ã¢ã®ã¢ãããã¼ãã®è¦ä»¶ãããå¤ãã§ããï¼ä¾ãã°ããããªãã¯ã¯ã©ã¦ãå©ç¨æ¤è¨æã®ãªã¹ã¯åæããäºæ¥ç¶ç¶è¨ç»ã®ä½æã»ãã¹ããã¢ãããã¼ããã§ããªãå ´åã®ä»£æ¿æªç½®ããããã¯ã¼ã¯åé¢ãªã©ã«ã¤ãã¦æ±ãã¦ãã¾ããï¼
ä»åã¯IIoTã®ã»ãã¥ãªãã£è
å¨ã¨IIoTã»ãã¥ãªãã£ãã©ã¯ãã£ã¹ã®å
¨ä½åã«ã¤ãã¦ç´¹ä»ãã¾ããã
次åã¯ãããããå
·ä½çãªã»ãã¥ãªãã£å¯¾çã¨ãã¦ãããªã·ã¼ã¨çµç¹ç対çã®å
容ã«ã¤ãã¦ç´¹ä»ãããã¨æãã¾ãã
â» å½ã³ã©ã ã«ãããå訳ã¯å½ç¤¾ã«ã¦è±æã翻訳ãããã®ã§ããããã®å 容ã«ã¤ãã¦ä¿è¨¼ãããã®ã§ã¯ããã¾ãããæ£ç¢ºãªå 容ãå¿ è¦ãªå ´åã¯é©å®ãè±æã®åæãåç §ãã¦ããã ãã¾ããããé¡ããã¾ãã
åèè³æ
- Good practices for Security of Internet of Things in the context of Smart Manufacturingï¼ENISAï¼
https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot - Good practices for Security of Internet of Thingsï¼ENISAï¼
https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot
Writer Profile
ã»ãã¥ãªãã£äºæ¥é¨
ã»ãã¥ãªãã£ã³ã³ãµã«ãã£ã³ã°æ
å½ ãã¼ãã³ã³ãµã«ã¿ã³ã
æ¸ç° åä¹
Tweet