This is my archive

Certificates 

Certificates  What are certificates used for? Certificates can be used for the following: Securing communication connections between participants in your ICS. Participants can be, for example: Devices used to build automation infrastructures and systems (such as PLCnext Technology controllers, switches, etc.). Server and client… Read More

Phoenix Contact industrial security guideline 

Phoenix Contact industrial security guideline  Introduction The increasing interconnection of systems, components, and devices as well as the growing amount of data to be transmitted and stored (in a word: the achievements of Industry 4.0) result in a higher risk of cyber attacks. This is also promoted… Read More

Passwords 

Passwords  Each (human) user of a system component needs to be identified and authenticated for all access. For that purpose, passwords can be used. Further authentication methods can be, for example, biometrics (e.g. finger print scanner, face recognition), tokens, physical keys, key cards or evaluating the geographic location… Read More

IT and OT/ICS: a comparison 

IT and OT/ICS: a comparison  Note: The abbreviation ICS stands for Industrial Control System. With regard to security, a distinction must be made between different types of technology or networks: IT Information Technology Office (accounting, sales, management, …). Here, the ISO 27001 standard for the plant owner… Read More

Security from the operator’s view 

Security from the operator’s view  Introduction Note: Many requirements are listed in both standards IEC 62443-2-1 and ISO/IEC 27001 From a plant operator’s point of view, many requirements apply that are defined in both ISO/IEC 27001 (which deals with IT system security) and IEC 62443-2-1 (draft edition 2.0). Even… Read More

Logging and monitoring 

Logging and monitoring  Log and status data as feedback for security improvements The early detection of security-relevant incidents as well of system errors and performance “bottlenecks” during operation or data transmission depends to a large extent on adequate logging and monitoring. In particular, log data and… Read More

VPN 

VPN  Via open Internet connections, criminals can copy data or make changes to the system. Using firewalls, the access to automation systems from the external networks can be restricted to authorized connections.  In addition, remote connections via the Internet should always be encrypted, for example via a… Read More

Protection of project data on the hard disk and during transfer 

Protection of project data on the hard disk and during transfer  Engineering and parameterization tools (e.g. PLCnext Engineer) often store plain, i.e., unencrypted project data on the harddisk of your computer. The data is therefore unprotected against tampering and theft. Use a suitable encryption method:  to… Read More

Plant management 

Plant management  Making (physical) on-site access controllable In addition to the remote access, the “physical access” on site must also be controlled and restricted if necessary. To prevent damage due to unauthorized access: Make sure that only authorized access is possible. Protect the interfaces by… Read More

Keys: PSK, private/public

Keys: PSK, private/public This topic introduces basic knowledge on keys.  Pre-shared Keys (PSK) Pre-shared keys (PSKs) can be used for authentication purposes. When establishing, for example, a VPN or WLAN connection, the PSK is used for exchanging the (symmetric) session key between the applications involved. Read More