摘要:
The invention relates to a controller module (7) for the dynamic configuration of an industrial control system, comprising: a current settings receiver (71) configured to receive current configuration and security settings of the industrial control system; a changed settings receiver (72) configured to receive changed configuration settings of the industrial control system; a settings analyzer (73) configured to determine, on the basis of the current configuration and security settings and the changed configuration settings, updated configuration and security settings of the industrial control system; and a dynamic activator (74) configured to dynamically establish at least one communication path in order to activate updated configuration and security settings of the industrial control system.
摘要:
Access control to embedded devices of an industrial control system wherein the embedded devices are grouped in security domains. When an access request is received, a security domain permission attribute associated with the access request and a security domain assignment attribute associated with the embedded device are retrieved. Access to the embedded device is denied, when the security domain permission attribute does not match with the security domain assignment attribute.
摘要:
A method for enabling a critical command of a device 16 in an industrial automation and/or control system 12 comprises the steps of: retrieving at least two authentication secrets, each authentication secret being assigned to a user group 26a, 26b, 26c and being retrieved by a user 18a, 18b, 18c assigned to the user group; proving to the device 16 that the user 18a, 18b, 18c is in possession of the retrieved authentication secret, and enabling the execution of the critical command, if possession of a predetermined minimal number of authentication secrets is proven successfully.
摘要:
A method for controlling the security settings of an electronic endpoint device (12) of an industrial control system (10) comprises the steps of: receiving a command to implement new security settings in the endpoint device (12); retrieving new security baseline information (50) for the electronic endpoint device (12), wherein the new security baseline information (50) comprises security settings for at least one component of the endpoint device; generating implemented security baseline information (52) from the implemented security settings of components (28) of the endpoint device (12); comparing the new security baseline information (50) and the implemented security baseline information (52); and implementing new security settings in the endpoint device (12) based on the new security baseline information (50), when the new security baseline information (50) and the implemented security baseline information (52) are not equal.
摘要:
The present invention is concerned with securing messages 4 within a communication network of an industrial process control system, in particular of a substation automation system. The invention provides secure communication in an Industrial Automation and Control System IACS controlling an industrial process with a plurality of nodes 1, 2, 3, i.e. communicating devices. For this purpose, a sender node 1 has a sender private key and receiver nodes have a sender public key. In an initial step a message 4 is encrypted by means of the sender private key. Subsequently, the encrypted message 4 is transmitted, i.e. multicasted, to a plurality of receiver nodes 2, 3. Two or more distinct receiver nodes 2, 3 decrypt the transmitted encrypted message 4 by means of the sender public key where successful encryption authenticates the messages 4 origin, i.e. the sender node 1. This way the multicasted message 4 is transmitted confidential and traceable with a low overhead for transmission.
摘要:
A method for storing operational data 28 of an industrial control system 12 comprises the steps of: receiving operational data 28 of the industrial control system 12; encoding the operational data 28 with an encoding function; storing the encoded operational data 30 in a database 38; receiving a database query; transforming the database query into a transformed database query compatible with the encoding function; receiving encoded query data 32 by executing the transformed database query on the encoded operational data 30 in the database 38; and decoding the encoded query data 32 with a decoding function.
摘要:
The present invention is concerned with security zoning or clustering, i.e. the task of defining a set of non-overlapping security zones and assigning each node or resource of an Industrial Automation and Control System (IACS) to exactly one zone. The invention is based on deterministic, engineered information about network nodes of the IACS as retrieved from an IACS system description file or equivalent representation of the system configuration. The invention suggests an automated, structured and repeatable approach for segmenting the network of an IACS to better provide cyber security functionalities in an IACS installation, to decrease the risk for unintentional errors and to provide traceable documentation on the network segregation. The invention allows for more thorough zoning than that performed manually by engineers, especially when dealing with complex network topologies, and reduces the time that engineers need to spend in designing an optimal solution that meets all the security zoning requirements and rules.
摘要:
A programmable logic controller (14) for an industrial control system (10) comprises an application logic execution layer (42) and at least one of an update checking layer (40) and an output checking layer (44). The application logic layer (42) is adapted for receiving sensor input data (32) from at least one sensor (16) coupled to the programmable logic controller (14) and for processing the sensor input data (32) to generate an output parameter (30) for an actuator (18). The output checking layer (44) is adapted for receiving the output parameter (30), for checking the output parameter, whether the output parameter is an allowed output parameter corresponding to a list (52) of allowed output parameters; and for outputting only an allowed output parameter to the actuator (16). The update checking layer (40) is adapted for receiving application logic update data (50), wherein the application logic update data contains information for updating the application logic (43). The update checking layer (40) is adapted for checking the application logic update data (50), whether the application logic update data is allowed application logic update data, by verifying, whether every application logic update defined by the application logic update data (50) corresponds to an application logic update in a list (48) of allowed logic updates, and for updating the application logic (43), only if the update data is allowed application logic update data.
摘要:
A new single password which may be valid for all control devices 20 of an industrial control system 10 may be entered by a user. After that, for each control device 20 the password is combined with a respective control device identifier, hashed and sent to the respective control device 20, which stores its specific hash value.
摘要:
A method for planning a reconfiguration of an industrial control system 10 comprises the steps of: receiving operational requirements 48 for at least one industrial computing facility 12 of the industrial control system 10; receiving cloud computing characteristics 54 of a plurality of cloud computing facilities 30; receiving cloud computing deployment rules 52; and generating a cloud computing deployment plan 58 by applying cloud computing deployment rules 52 on the operational requirements 48 and the cloud computing characteristics 54.