A major pharmaceutical company with centralized servers was at constant risk of security breaches. The manufacturing equipment computers are connected to the plant server.

Infrastructure Management

OBJECTIVE

A major pharmaceutical company with centralized servers was at constant risk of security breaches. The manufacturing equipment computers are connected to the plant server.

Objective: Reduce malicious cyber threats to hardware and software while maintaining a compliant environment.

SOLUTION

  • RCM was charged with executing the management, supervision and installation of Window Cyber Security patches to all Equipment/Computers in the Packaging area, at minimum, every Quarter or during interval cycles determined by the Client.
  • The client provided the new patch sets to be installed.
  • To minimize prolonged downtime during equipment intervention, RCM suggested that the Cyber security upgrades be integrated into the Preventive Maintenance (PM) program, to be performed during the PM schedules.

BENEFITS

  • Installation is performed minimizing disruption to operations. The disposition of the RCM team on a 24 x 7 basis allows the installation of the patch sets during equipment availability.
  • RCM technicians were trained to be part of the Automation Group allowing for the completion of their required tasks during the PM interventions and not depending on the Automation technicians to access the HMIs while the Automation technicians concentrated their efforts on the PM tasks.
  • Improved coordination during the daily work team meetings to confirm and schedule the PM activities and upgrade opportunities.

Result: The integration of the Automation Team and the RCM Cyber Security Team allows for a more consistent execution of everyone’s tasks and increased productivity.

Key Project Elements

Assess for Compliance, Regulatory Risk and Impact

Identify Security Gaps

Increased Efficiencies and Productivity

Alignment between the automation Team & RCM Cyber Security Team

Consistency in Execution of Tasks while Reducing Risks in Security Breaches