A BioPhorum member only survey on detection tools and processes, questioning tooling and ways of working in cyber security
cyber security
Viewing related articles
Cyber – Detection processes​ sprint one
Oct 2021 | Cybersecurity, Information Technology, Publication
An internal document looking at defining and prioritizing the common problem statements as they relate to detection and detection processes within a biomanufacturing operational shop floor.
Patching barriers framework for manufacturing and mitigating actions
Oct 2021 | Cybersecurity, Information Technology, Publication
A BioPhorum members only document which examines the structural barriers framework and captures the barriers that make patching in manufacturing so difficult.
Manufacturing patching practices: safeguarding the manufacturing environment
Aug 2021 | Cyber security, Cybersecurity, Deliverable, Information Technology, POI - Information Technology, Publication
This paper presents seven BioPhorum manufacturing patching practices. It provides guidance to help focus your thoughts and ideas if you are tackling the same issues within your manufacturing environment. It identifies barriers that can make patching difficult (or even impossible) and proposes mitigation practices that you should consider to overcome these barriers and associated risks and use to support a successful program of patching within the manufacturing environment.
Cyber Education Series: Guidance on how to write a disaster recovery playbook for the manufacturing environment
Nov 2020 | Cyber security, Cybersecurity, Deliverable, Information Technology, POI - Information Technology, Publication
This ‘how-to’ guide is intended to help companies decide what they should consider in advance of a disaster event and what to include in the disaster recovery playbook. It is not a definitive set of steps to recover an impacted manufacturing plant. Rather, it can be used as a prompt to develop the detail needed to create a disaster recovery playbook for a manufacturing plant, customizable to any organization.
Cyber security: A standard CMDB data model for pharmaceutical manufacturing shop floor systems
Jul 2020 | Cyber security, Information Technology, POI - Information Technology
Pharmaceutical manufacturers are developing and using Configuration Management Databases (CMDB) to maintain inventories of the IT and automation assets used by the manufacturing and laboratory systems at their production facilities. A CMDB can provide access to accurate data, including available assets, where they are, how they are configured, and the relationships that exist between them; all of which are vital functions for lifecycle management, change management, incident management and patching.
The information model typically used by the standard CMDB installation is based on the idea that all systems used by the enterprise are software based and described by a class of objects called an application. This does not always align to the needs within an operations technology (OT) environment. Therefore, the BioPhorum Cyber Security members, using their extensive combined knowledge, have collaborated to design a common information model describing a manufacturing system detailed in a shop floor/OT CMDB. The proposed model is intended to be a free, reusable, standard structure which can be adapted for specific company needs, providing a good starting point for configuration data modelers working in the OT space.
Biomanufacturing technology roadmap: 4. Automated facility
May 2017 | POI - Technology Strategy, Technology Strategy
This chapter of the first edition biomanufacturing technology roadmap published in 2017, describes the vision, scope and benefits that could be gained in the biopharmaceutical manufacturing industry from the development and implementation of effective automated facilities. To help the industry achieve this future state it describes the scenarios considered, the future needs, challenges and potential solutions as well as the linkages and dependencies on other parts of the roadmap. It considers the contribution that disruptive and emerging technologies can play and regulatory considerations before finalizing with conclusions and recommendations.