Hardware Authentication in Manufacturing: Why FIDO2 Keys Are the Future of Industrial Security
28/07/2025 by Jan Quack
In my latest blog post, I examine the challenges facing the manufacturing industry more closely. What solutions are available, and what benefits do they offer? Finally, I share my conclusion.
Introduction
Cyberattacks are on the rise, with the manufacturing industry being the main target. In 2024, the manufacturing industry was the single most targeted sector for cyberattacks - accounting for over 25% of all global cyber incidents for the third consecutive year. Particularly alarming is the rise in phishing attacks, which surged by 80% from September 2023 to September 2024. In Germany alone, 53% of companies cited phishing as their top cyber threat.
This growing risk is driven by the increasing complexity and connectivity introduced by Industry 4.0 technologies, including IIoT devices, cloud infrastructures, and OT systems. These innovations expand the attack surface and require a more robust and comprehensive security approach. Also, things like insecurely linked IT and OT environments in combination with shared user accounts in the OT ecosystem make the attack surfaces even bigger.
A successful attack on IT systems can lead to a significant security incidents in OT and vice versa. To remain resilient and compliant, manufacturers must align with global regulations like the FDA, OSHA, EPA, ISO 9001, GMP, and European frameworks such as NIS2 and KRITIS.
1. Three Key Challenges for the Manufacturing Industry
Phishing Attacks: The Gateway to Ransomware
Phishing remains the most common method of introducing ransomware into IT and OT networks. For manufacturers, this often results in production stoppages and costly downtime.
A growing attack surface
With the integration of digital systems and networked devices, physical access points, such as production areas and offices, are also vulnerable to attack.
Regulatory compliance
From FDA equipment safety standards to ISO 9001 quality frameworks, manufacturing companies must ensure that they meet stringent global safety requirements.
2. A Modern Solution: the Swissbit iShield Key 2 series
Swissbit’s iShield Key 2 offers a compact, all-in-one solution for digital and physical access control, tailored to the unique needs of the manufacturing environment.
Digital and Physical Access in One
Supporting major physical access technologies (MIFARE, HID, LEGIC), the iShield Key 2 can replace traditional badges or keycards. It integrates seamlessly into existing infrastructure and enables passwordless login with FIDO2, multi-factor authentication, and OTP (one-time password) functionality.
Certified Security
With FIPS 140-3 Level 3 and Common Criteria EAL6+ certifications, the iShield Key 2 delivers government-grade protection. These certifications ensure strong encryption, tamper resistance, and data integrity.
Built for the Factory Floor
Ruggedized and highly durable, the device is ideal for production environments where smartphones and laptops may not be permitted due to safety or electromagnetic interference concerns.
Cost-Efficient and Scalable
By combining physical and digital authentication into a single device, companies can reduce complexity and save on device management and support efforts.
3. Looking Ahead: Passwordless by Default
According to the 2025 HYPR State of Passwordless Identity Assurance Report, hardware authentication devices and FIDO passkeys are expected to become the gold standard by 2027. Swissbit’s iShield Key 2 positions manufacturers to lead in this transition—ensuring they’re prepared for a passwordless future.
Conclusion
As cyber threats intensify and regulations tighten, manufacturers can no longer afford fragmented or outdated security systems. The Swissbit iShield Key 2 delivers a future-proof authentication platform - combining security, usability, and compliance in one powerful tool. And with Swissbit, you gain a trusted European partner ready to secure your digital transformation journey.
Would you like to consider your physical and digital access together?
We would be happy to show you how you can build a scalable security architecture with a hardware token without compromising productivity. Convince yourself of our expertise and just contact us!