This is my archive

360° security – the holistic approach 

360° security – the holistic approach  Comprehensive and sufficient security is not achieved by implementing only (one) technical measures in the system. An adequate security concept must include the technology used, defined processes, and the people involved, i.e., it must specify both technological and organizational measures. Security… Read More

Protection of project data on the hard disk and during transfer 

Protection of project data on the hard disk and during transfer  Engineering and parameterization tools (e.g. PLCnext Engineer) often store plain, i.e., unencrypted project data on the harddisk of your computer. The data is therefore unprotected against tampering and theft. Use a suitable encryption method:  to… Read More

IT and OT/ICS: a comparison 

IT and OT/ICS: a comparison  Note: The abbreviation ICS stands for Industrial Control System. With regard to security, a distinction must be made between different types of technology or networks: IT Information Technology Office (accounting, sales, management, …). Here, the ISO 27001 standard for the plant owner… Read More

Certificates 

Certificates  What are certificates used for? Certificates can be used for the following: Securing communication connections between participants in your ICS. Participants can be, for example: Devices used to build automation infrastructures and systems (such as PLCnext Technology controllers, switches, etc.). Server and client… Read More

Technical PC hardening measures 

Technical PC hardening measures  Any engineering tool, such as PLCnext Engineer, can manipulate devices or processes in your ICS. To reduce the risk of manipulation, perform security evaluations regularly.  PC-based hardening and organization measures Protect any PCs used in automation solution environments against security-relevant manipulations. This… Read More

Anti-malware inspection 

Anti-malware inspection  The list of security incidents in industry is growing longer all the time: Stuxnet, Industroyer, TRITON, or WannaCry are examples of malware/ransomware which attacked SCADA systems, safety controllers etc. While anti-virus/anti-malware software is common and widespread on IT systems, OT components are often still unprotected. Read More

Logging and monitoring 

Logging and monitoring  Log and status data as feedback for security improvements The early detection of security-relevant incidents as well of system errors and performance “bottlenecks” during operation or data transmission depends to a large extent on adequate logging and monitoring. In particular, log data and… Read More

ICS security concept by Phoenix Contact

ICS security concept by Phoenix Contact This topic describes how Phoenix Contact solves the requirements regarding cyber-security.  Note: This description and the illustrations in this chapter are schematic and exemplary in nature. They do not claim to be complete. Details on technical implementations and practical realization can… Read More

Restricted mobile access: protecting a WLAN by password 

Restricted mobile access: protecting a WLAN by password  Unauthorized smart devices must not be able to connect themselves via the WLAN interface. For that reason, your strict password rules should also apply to all wireless access points in your ICS.  WLAN components from Phoenix Contact enable automated… Read More

TLS / HTTP(S) 

TLS / HTTP(S)  To secure the transmission of data between network devices used to build automation infrastructures and systems (such as controllers), or between an engineering software and devices which you configure and commission via this software, you should use security-capable transmission wherever they are supported. Such protocols… Read More