The website or it’s third-party tool use cookies, which are necessary for it’s functioning and required to achieve the purposes illustrated in the cookie policy. You accept the use of cookies by closing this notice.
2025-06-26
As the world becomes increasingly interconnected, engineers and manufacturers face a number of security challenges. Sharing design and engineering data with far-flung associates around the world, along with customers, suppliers and third-party manufacturing firms can put intellectual property (IP) at risk. At the same time, cyberattacks like phishing and ransomware are increasing in frequency, which can endanger a firm’s data and reputation.
We spoke to experts at a number of firms with different perspectives on how to secure engineering data in this environment. Assembrix offers a platform (VMS) to help companies outsource manufacturing to partners around the globe while securing their IP and maintaining quality control. Xometry is an on-demand industrial parts marketplace that recently achieved Cybersecurity Maturity Model Certification (CMMC). IMAGINiT (a division of Rand Worldwide) is an Autodesk reseller and consultancy. Accenture recently formalized a partnership with Siemens to create the Accenture Siemens Business Group to “co-develop and jointly market solutions to clients that combine automation, industrial AI and software from the Siemens Xcelerator portfolio with Accenture’s data and AI capabilities,” as well as managed security services.
What are the key security concerns/threats when it comes to engineering and manufacturing data?
Lior Polak, CEO, Assembrix: A digital twin in additive manufacturing (AM) is a virtual model of a physical object or process, integrating real-time data from AM build files, sensors and IoT devices to mirror production. These files, embodying significant time and expertise, are critical to the digital twin’s value, making them prime targets for IP theft, especially by rogue actors in trusted supply chain organizations. The key security concerns are:
Mark Flayler, Engagement Engineer in the Manufacturing Service Division, IMAGINiT Technologies: Engineering and manufacturing data are critical assets for organizations, and their compromise can lead to significant financial, operational and reputational damage. Key security concerns and threats in this context include:
Piyush Jain, Products Security Lead, Accenture: Due to the increasing IT/OT convergence and the rise of cloud-based services, the exposure of industry plants to the internet is ever-increasing. This increases attack vectors dramatically and even more facilitates APTs [advanced persistent threats] like state-sponsored groups to attack our critical production infrastructure.
In today’s hyper-connected manufacturing ecosystem, securing engineering data is not just an IT concern—it’s a business imperative. Securing engineering and manufacturing data is critical to preventing intellectual property (IP) theft, unauthorized modifications, industrial espionage and cyberattacks that could disrupt operations. Data integrity attacks, where specifications or models are tampered with, can lead to flawed or unsafe products. Insider threats, employees or contractors misusing their access, pose risks of data theft, alteration or leakage. Weak access controls, and outdated legacy systems, further increase exposure. Lastly, the use of collaboration tools and remote access platforms can lead to IP leakage if not properly secured. For example, sensitive design files or documents shared over unencrypted channels or with improperly configured access settings may be accessed by unauthorized users. We have also often seen that employees unknowingly share proprietary content through personal devices/cloud storage without appropriate controls, increasing the risk of data leakage.
Tarit Mitra, Head of Cyber and Information Security, Xometry: At Xometry, we take a proactive approach to cybersecurity, as demonstrated by our early adoption of CMMC Level 2 certification. We recognize that security is constantly evolving—yesterday’s cutting-edge technology becomes today’s standard and tomorrow’s legacy technology. That is why we’re constantly evaluating our technology stack against market innovations and emerging threats.
Here are just three examples of our security principles that we think are instructive for others.
They include:
1. Implementing a zero-trust model requiring continuous verification for all users and devices;
2. “Shifting left” in our development lifecycle to embed security testing from the earliest stages, and
3. Leveraging AI to detect and respond to increasingly sophisticated attacks.
How do your products and services help secure that data?
Polak, Assembrix: Assembrix’s platform is a cloud-based solution designed to virtualize and secure the AM digital thread, including digital twin data critical for AM processes. The platform includes multiple features and capabilities that have been developed over years and [are] tailored to the AM process so that they address customers’ needs and risk factors.
Assembrix VMS uses state-of-the-art blockchain-based encryption to secure digital twin data, ensuring that even insiders cannot access or misuse files without authorization. The platform implements strict role-based access controls, limiting who can view or modify AM build files, reducing the risk of insider theft.
In addition to providing secure transfer of manufacturing data, Assembrix also provides real-time monitoring. Image courtesy of Assembrix.
VMS virtualizes the AM process, enabling secure remote printing while maintaining control over the digital thread. Its cloud-based architecture incorporates robust cybersecurity measures, such as encryption and real-time monitoring, to protect against ransomware and phishing attempts. The platform oversees the entire AM workflow—from design to verified part—reducing vulnerabilities in data transmission that could be exploited in phishing or ransomware attacks.
VMS ensures IP protection through advanced encryption, preventing unauthorized access or copying of digital twin data, such as proprietary AM parameters. The platform provides a real-time data feed for monitoring print status, coupled with blockchain for an auditable transaction trail, ensuring no excess parts are produced or designs misused.
VMS applies digital twin-in-context to store and analyze data points and relationships within print batches, streamlining the management of complex digital twin datasets. The platform also uses machine learning to provide recommendations for quality control and cost reduction, handling large data volumes efficiently.
Jain, Accenture: Accenture’s Managed Security Services address threats to engineering and manufacturing data through a comprehensive, industry-focused approach. Leveraging deep expertise in both information technology (IT) and operational technology (OT) cybersecurity, Accenture provides 24/7 threat monitoring and response, tailored to protect IP, secure design files and safeguard operational technologies like PLCs [programmable logic controllers] and CNC [computer numeric control] systems. The offering includes advanced identity and access management to prevent unauthorized access, insider threat detection using behavioral analytics and robust protection of collaboration tools to avoid accidental IP leakage. Accenture also helps secure legacy systems through vulnerability management and network segmentation leveraging zero trust, thus isolating critical systems like CAD servers, PLCs or manufacturing execution systems.
Accenture is working with Siemens to offer new cyber protection for manufacturing environments at the intersection where engineering data and production execution meet—securing innovation from design through delivery. This joint IT/OT cybersecurity approach leverages Siemens’ Remote Industrial Operations Services (RIOpS) and Accenture’s managed security services, including the Managed Extended Detection and Response (MxDR) platform, to detect and respond to cyber threats. We are combining Siemens’ Automation, IT and service domain knowledge with Accenture’s ability to offer best-in-class cybersecurity services, 24/7/365, connected worldwide.
Mitra, Xometry: Xometry achieved a perfect score on our CMMC Level 2 audit, making us an industry pioneer in meeting this rigorous standard. Given that we routinely handle sensitive and export-controlled data, we maintain strict protocols to ensure this information only resides on CMMC Level 2 compliant systems, such as FedRAMP authorized cloud providers, with access restricted to authorized personnel only.
What are some key best practices around engineering/product data that companies should follow when it comes to security? Are there any challenges specific to this type of data that companies should be aware of?
Assembrix provides a remote print platform that is designed to protect IP when using third-party manufacturing services. Image courtesy of Assembrix.
Polak, Assembrix: Among the best practices companies should follow when it comes to security are:
Jain, Accenture: We support the customer in applying and operating a defense-in-depth approach, thus enabling them to protect their engineering data. With constant security monitoring we detect breaches early and can react before the attacker even reaches critical software assets like production or engineering data.
When dealing with engineering data, which typically includes CAD files, design schematics, simulation models, product lifecycle data and industrial process details, there are several security best practices we advise companies to follow. Some of the key best practices our clients are adopting are as follows:
Engineering data presents unique security challenges due to its high value and complex lifecycle. It often contains IP, making it a prime target for competitors and nation-state actors. The large file sizes and proprietary formats typical of CAD, simulation and 3D modeling tools complicate secure storage, sharing and interoperability. With design and manufacturing increasingly distributed across global teams, organizations face varied regulatory environments and expanded attack surfaces. Compounding this is the need to integrate engineering data across legacy and OT systems, which frequently lack modern security controls. Security maturity is often inconsistent across engineering platforms like product lifecycle management (PLM) or supervisory control and data acquisition (SCADA), limiting the ability to enforce unified policies. The long lifespan of engineering data often retained for decades due to compliance needs further amplifies the risks to data integrity and confidentiality.
Mitra, Xometry: Engineering and product data security are core to our business at Xometry. We continuously evaluate and optimize our practices while looking holistically across all attack surfaces for any potential threats.
A significant challenge in our industry involves securing operational technology (OT) such as 3D printers and CNC machines. To secure these devices, network segmentation and the use of VLANs [virtual local area networks] is important, as is limiting USB access to any workstations connected to OT.
How can companies mitigate engineering data risk when sharing data with partners across the manufacturing chain or supply chain?
Jain, Accenture: Reducing the risk of engineering data exposure in manufacturing and supply chain collaboration requires a layered strategy that ensures robust cybersecurity without compromising operational agility. Organizations are taking different approaches depending on the data criticality, geography and usage.
Mitra, Xometry: Partner adherence to standard security frameworks such as NIST 800-171 or ISO 270001 is a useful indicator of their ability to safely handle data. The CMMC framework, which builds on NIST 800-171 and requires a third-party audit, offers a high level of assurance for aerospace and defense work. It’s also important to implement technical controls to ensure that highly sensitive data such as export-controlled data flows exclusively to partners that are authorized to access it.