Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Open Systems

Chapter 49
49.1 Integration of Control and Information Systems
49.2 Standards and Enabling Technologies
49.3 Architecture
49.4 Data Objects
49.5 Object Linking
49.6 Open Process Control
49.7 OPC and the Internet
49.8 Openness and Security
49.9 Information and Control Security
49.10 Information Security Management
49.11 Firewalls
49.12 Demilitarised Zones
49.13 Malware Summary
49.14 Anti-Virus Software
49.15 Comments

An open system is one that is based on widely used ating systems and networks.It was difficult enough
industrial standards. This covers programming to connect one system up to a another from the
languages, operating systems, display technologies same supplier, let alone from a different supplier.
and communications networks. There are three The porting of software and implantation of new
principal issues involved in systems being open: processors was simply out of the question.
access, inter-operability and security. An open sys-
tem provides unrestricted access, from anywhere
in the system, to data for information and display 49.1 Integration of Control and
purposes. Inter-operability features include:
Information Systems
• Portability of application software, i.e. software
developed for one system capable of being run The ability to merge and manipulate real-time
on another data from control systems with cost, quality and
• Scalability of hardware, i.e. the ability to migrate scheduling data from information systems enables
to a different, more powerful, processor without operators and managers to make timely decisions
having to rewrite any software about processes and production. There is an inex-
• Ability to mix and match hardware and software orable blurring of the boundaries between tradi-
from different suppliers tional so-called islands of automation, leading to
integration of control and information systems. A
Open systems are the antithesis of the mono- variety of commercial pressures on both end-users
lithic ICS and early DCS systems, as described in and control system suppliers are reinforcing this
Chapter 38, which were based on proprietary oper- move towards open systems. For example:
352 49 Open Systems

• Access to on-line control data enables perfor- • The cost of developing quality system software is
mance against increasingly stringent environ- such that suppliers are entering into third party
mental and safety regulations to be monitored agreements rather than develop it themselves.
more effectively. Thus graphics packages, relational databases,
• Advanced control and optimisation techniques etc. are supplied as part of a system. This is only
are commonly used to maximise profits. These feasible with a common platform.
techniques are information rich and require ac-
cess to data about costs and production require-
ments.
• Responsiveness to market demands requires 49.2 Standards and Enabling
flexibility in processing to meet rapidly chang- Technologies
ing production requirements. Thus control
schedules need to take operational constraints It is obvious that a necessary prerequisite for open
into account. systems is the existence of common standards,
• Flatter management structures mean that re- whether they are of an industry de facto nature or
sponsibility for decision making is pushed down produced by a standards authority such as IEC or
to the lowest levels practicable. This is only pos- IEEE. Standards take a long time to develop which,
sible if appropriate information is readily acces- in part, explains why open systems have taken so
sible at all levels. long to come about. This is largely because the is-
• The advent of intelligent instrumentation pro- sues are complex and it is often difficult to reach
vides much more control data than hitherto. genuine agreement between end-users and suppli-
Also, data related to instrument performance is ers, and between different countries. Choices have
available, for which there is a requirement for to be made between differing practices and tech-
integration with maintenance planning. nologies and invariably there are conflicting inter-
• Control systems’ hardware is increasingly be- ests. Nevertheless, a set of common standards has
comes a commodity product. To retain prof- emerged and others are coming to fruition. The
itability, system suppliers are shifting towards enabling technologies of particular note are:
the provision of advanced control techniques • Operating systems: Windows 2003/XP, UNIX,
and the integration of control functions with Linux
MIS and CIM capabilities. • Languages: C++, Visual Basic, Java, SQL, IEC
• The end-user’s investment in application soft- 61131, DDL, etc.
ware may well be the most valuable part of a con- • Networks: Ethernet (IEEE 802.3), token bus
trol system as it represents the intellectual out- (IEEE802.4), fieldbus (IEC 61158), etc.
put of some its best engineers. The use of stan- • Data access: OLE (ActiveX), OPC, etc.
dard operating systems, languages and proto- • Data structures: ISA S95 and IEC 61512
cols enables portability, if not yet between man-
ufacturers but at least between systems from the
same supplier.
• Industrial quality control system hardware has
49.3 Architecture
to be rugged for plant and control room use. Of- The impact of open systems is to flatten the archi-
fice equipment, such as PCs and workstations, tecture of control systems into two domains, con-
is relatively cheap. There are real cost benefits trol and information, as depicted in Figure 38.11.
from being able to mix industrial and commer- Elements at the control level are connected
cial equipment in the same system. This is only to a highway which is typically token bus. If the
possible if they work to the same communica- highway is proprietary and/or non-standard, gate-
tions standards and protocols. ways are required to provide compatibility be-
49.4 Data Objects 353

tween them.Gateways also enable serial links to in- The use of data objects is only meaningful in the
telligent instruments and to HART,Profibus and/or context of distributed databases within an open
fieldbus devices. system in which the objects are globally accessible.
The information domain is invariably based on There are various advantages in using data objects:
Ethernet using TCP/IP, as described in Chapter 40,
which is the de facto multivendor network. This • Applications can access data in the form of ob-
enables any required combination of NT or UNIX jects by name only, typically a tag or block num-
based workstations, X-Windows terminals, com- ber, without reference to precise data addresses.
puters and file servers to be used. • The data object exists as a single point within the
When all the elements of a system have a system, thereby ensuring that the data accessed
common standard real-time operating system and is up-to-date, complete and consistent.
common communications and display standards, • A standard application program interface (API)
data can be accessed and displayed at all levels: can be readily defined and provided to third par-
operator displays at management levels and man- ties so that their applications and devices can be
agement displays at operator level,subject to access seamlessly integrated.
control as appropriate. Likewise, data held in rela- • Structured query language (SQL) extensions can
tional databases can be accessed by client-server be defined to access data objects within a client-
techniques at all levels. server architecture which can connect smoothly
An important development is the evolution and reside securely within larger, enterprise
of operator control stations (OCS) based on a wide, proprietary relational databases.
ruggedised form of workstation which provides
operators and engineers with a single point of ac-
cess to both control and plant-wide information. 49.5 Object Linking
Thus a single workstation doubles up as a human
interface for system development and as an opera- Object linking and embedding (OLE) is an open
tors control program (OCP) for control purposes. standard for connecting applications in a Windows
It is essential in handling information in the or UNIX environment. It provides dynamic real-
control domain that the systems are: time links with databases and networks for process
control using standard interfaces. Using OLE con-
• Robust in the sense that the operating systems
cepts, applications can be developed with a stan-
do not crash dard interface to other applications developed to
• Deterministic in that events are guaranteed to
the same standard, thereby offering true software
take place on time
inter-operability. This is depicted in Figures 49.1
• Permanent in the sense that critical software
and 49.2 which contrast bespoke customised inter-
cannot be corrupted
faces with OLE based ones.
• Reliable and able to support redundancy if nec-
essary
• Secure from faults in the information system
Application X Application Y
• Tolerant of operator errors
• Resistant to unauthorised external access

49.4 Data Objects


Server A Server B Server C
Data objects are items such as process variables,
function blocks, parameter lists, programs, etc.
They exist as discrete entities within a data base. Fig. 49.1 Customised interfaces
354 49 Open Systems

interfaced with standard packages such as Excel


Application X Application Y
and Access for calculation and logging.
Developments on the OLE front have caused a
OLE interface OLE interface
revolution in productivity in the design of systems
for automation, especially in enabling the integra-
tion of control hardware and intelligent devices
with information systems. The cost of putting the
components together in building such systems is
OLE Server A OLE Server B OLE Server C but a fraction of what would be the cost of writing
them in the first place.
Fig. 49.2 OLE based interfaces

OLE allows programs to be broken down into ob-


49.6 Open Process Control
jects, or components, which can be considered as OLE for process control (OPC) is an open standard
building blocks. They are built around standard for process control. It focuses on the definition of
protocols and hence can communicate with each the components required for real-time transfer of
other, are platform independent and are reusable. data between an OPC server and an OLE compliant
Components are combined into an application by application. An OPC server is simply a device that
a configuration type of process referred to as ag- collects data that is consistent with the OPC proto-
gregation. There is no limit to aggregation and ag- col and makes that data available simultaneously to
gregated components may themselves aggregate. any number of OPC clients. The standard consists
OLE permits parallel transfer of data between of an evolving set of plug-and-play OLE interfaces
applications, with practically no limit to the size of intended for linking DCS, SCADA and PLC type
data block, which is very efficient. This is in stark systems with each other and for integration with
contrast with dynamic data exchange (DDE), an- applications such as control and data acquisition.
other Windows standard which relates to computer The objective of OPC is to enable inter-
aided design (CAD) environments, in which data operability between different automation applica-
transfer is serial and block size is limited. DDE tions written in different languages and running on
is unsuitable for most control purposes, although different platforms anywhere within an open sys-
“fast DDE” does permit multiple block transfers. tem. Fundamental to this objective is acceptance
OLE-DB incorporates the open database con- of information system standards such as ISA S95.
nectivity (ODBC) access interface. It is being de- The benefits of OPC are:
veloped to enable corporate databases, either in
computers or of a relational nature in file servers, • Instrument and system hardware suppliers will
to communicate with PC based data. The program- only have to produce one OPC compliant inter-
mer will then be able to use OLE components to face for each device.
access data anywhere in the organisation. • Users will be able to choose the best mix of hard-
The OLE standard is now referred to as ActiveX ware for a given application,
and its components are referred to as controls. • Suppliers’ costs will be contained because the
The Microsoft.Net development environment, us- same standard components will interface to dif-
ing the Visual Basic language,provides facilities for ferent hardware.
accessing and linking ActiveX components. This • Efficient data transfer from devices to applica-
enables fully functional systems to be created from tions.
libraries of open components provided by the sup- • Standard techniques for addressing information
pliers of I/O hardware, display systems, etc., and in process control systems and devices.
49.7 OPC and the Internet 355

An important extension to OPC is the development with display formats and does not support re-
of OPC-DX which acts as a software gateway. Each usability of data. For example, if the same data is to
device with an OPC-DX interface has both a client be displayed and printed, two separate script files
and a server part. The client part consumes data must be created with different format instructions
from other devices for use by its application (read) for video and printer.
and the server part produces data from its device An important extension to OPC is the extensi-
for other applications (write). Connection of de- ble markup language (XML) which allows instruc-
vices using DX interfaces is done by means of a tions to be distinguished from data. OPC XML
configuration tool from a library of device types scripts enable identifiable packets of data to be
using drag and drop techniques. exchanged over the internet. XML is a web ser-
OPC-DX is of particular significance in the vice technology and control systems suppliers are
context of intelligent instrumentation. Network- starting to incorporate programs written in XML
ing of field devices has resulted in a number of to distribute process and other data across TCP/IP
widely accepted fieldbus protocols such as HART networks.
and Profibus, as explained in Chapter 50, resulting
in the need for multiple bespoke gateways to es-
tablish effective communication with third party
devices. DX offers the prospect of becoming the
49.8 Openness and Security
de facto API for communication with and between The Achilles heel of openness is security. The es-
fieldbus function blocks. sential problem is that the more open a system
becomes the more vulnerable it is to unauthorised
access. This is especially so when MIS and (even)
control systems are connected up to intranets and
the internet. There are various dangers which may
49.7 OPC and the Internet be categorised as follows:
Increasingly process control systems are being
connected to the internet. This might seem to be • Inadvertent. For example, persons using the in-
a bizarre thing to do, given the security issues de- ternet to legitimately access data within an MIS,
scribed in the following section, but there are good or functions within a control system, may in-
reasons for doing so. For example, under certain advertently corrupt data or introduce a virus. A
safety or operability related circumstances, it may summary of virus types is provided in Section
be appropriate for a control system to alert key per- 13.
sonnel to a situation by automatically generating • Mischief. Hacking is a well known phenomenon
an e-mail. Sometimes, suppliers have access via the for which tools and training is readily available.
internet to control systems that they have supplied Hackers are often motivated by the challenge
for diagnostic and maintenance purposes. Inter- and satisfaction of breaking into a system rather
net connections are increasingly used to abstract than for the damage they can cause. However, a
information from a control system into other ap- breach in security is damaging in itself because,
plications, such as SPC packages. Access is often when revealed, usually by a message left by the
provided over the internet to data within the con- hacker, there is uncertainty as to what damage
trol for management purposes. may have been caused.
For internet applications,the hypertext markup • Spying. Use of the internet, by hacking or oth-
language (HTML) is used to write small programs erwise, provides access to data in a company’s
(scripts). HTML scripts contain commands which MIS.Data such as recipes and production sched-
are executed when the program is run. However, ules can potentially give a competitor significant
HTML is a scripting language largely concerned commercial advantage.
356 49 Open Systems

• Malicious intent or sabotage.For somebody with FS1 WS Host PC1


a grudge against a company, say a current or for-
mer employee, unauthorised access would pro- Ethernet
vide the opportunity to wreak havoc. This may
be by the simple but effective means of deleting FW
files, programs or data within the MIS. Or it may
be more subtle by, for example, changing key pa- OCS
HM AM FS2 GW1 PC2
rameters that lurk in a control system and cause
it to function incorrectly or even dangerously in
the future. Highway
Restriction of access to authorised users depends
PCU PLC SLC Fieldbus
upon how they are trying to access a system.For in- GW2
ternal personnel there is an obvious need for access
to the MIS and/or control system. The common Fig. 49.3 Open system with simple firewall
approach is to have a security policy which de-
termines level of access according to job function
and expertise. This is typically realised by means
of a password and, for greater security, can involve 49.9 Information and Control
keys, swipe cards or even signatures such as finger,
retina or voice prints. The essential thing is that
Security
the policy is policed with named individuals, levels There are two generic standards,IEC 17799 (Part 1)
of access, dates of issue and periods of validity all and BS 7799 (Part 2), concerning information se-
being monitored, reviewed regularly and changed curity management systems. These have emerged
if/as appropriate. Systems are at their most vulner- from the commercial world rather than control and
able following personnel changes, or when third automation,and do not explicitly address the prob-
parties are given temporary access for some spe- lems of IT security in the context of real-time sys-
cific project. See also Chapter 64. tems. However, many of the principles involved are
For external personnel, access is usually via common and are certainly applicable to any on-
the internet and is restricted by means of a so- line MIS connected to a control system, DCS or
called firewall. Firewalls are discussed in more de- otherwise, and to any off-line systems used for de-
tail in Section 49.11.In essence,a firewall is a device sign purposes.
through which messages via internet connections There are another two US standards which are
are forced to pass, as depicted by the box labelled more specific to the process industries – AGA 12
FW in Figure 49.3. The messages are examined by and API 1164. These concern the security from cy-
a program within the firewall and either accepted ber attack of SCADA systems used in the gas and oil
or rejected according to some rule base. A fire- industries respectively in relation to the national
wall will prevent unauthorised access and search critical infrastructure.
attachments to messages for known viruses, but The body concerned with cyber attack in the
cannot prevent unknown (to the firewall) viruses UK is the National Infrastructure Security Co-
from getting through to the control system. ordination Centre which has produced a guide
It should be remembered that there are other to principles of good practice for process con-
means of remote access to a control system such trol security through the development of a secu-
as dial-up connections, wireless systems and third rity framework. Although this NISCC (2005) guide
party connections. In focussing on internet access specifically refers to SCADA systems, it is just a
and firewall solutions, these other forms of intru- applicable to DCS, PLC and hybrid systems. Three
sion shouldn’t be overlooked. guiding principles are employed:
49.10 Information Security Management 357

1. Protect, detect and respond: • The number of external connections be iden-


• Put in place protection measures to prevent tified and reduced to an absolute minimum.
and discourage electronic attacks. Segregate and/or isolate process control sys-
• Deploy means to rapidly identify actual or tems from other networks,with dedicated in-
suspected attacks. frastructure for safety related systems.
• Take appropriate action in response to con- • Connections between the control system and
firmed security incidents. network connections be protected with fire-
2. Defend in depth: walls. Implement effective management of
• Implement multiple protection measures to firewall configuration and change control.
avoid single points of contact. • Control systems be hardened to prevent net-
3. Manage protection: work based attacks. Thus all unused services
• Recognise the contribution of procedural and ports in the operating system and appli-
and managerial measures such as change cations should be removed or disabled, and
control, firewall monitoring and assurance, all inbuilt system security functions enabled.
and training. • E-mail and internet access from the control
system be disabled.
• Wireless networking be avoided wherever
possible.
49.10 Information Security • Control systems be protected with anti-virus
Management software on servers and workstations. Ac-
creditation and configuration guidance from
The NISCC (2005) guide focuses on seven key
the control system supplier is strongly rec-
themes, summarised below, for each of which fur-
ommended.
ther more detailed guidance is being developed:
• Any new device connected to the control sys-
1. Understand the business risks. tem is proven to be virus free.
The objective is to gain a thorough understand- • Security systems, that is firewalls and anti-
ing of the risks to the business from threats to virus software,be kept up to date.Procedures
its control systems in order to identify and im- should be based upon supplier certification
plement the appropriate level of security pro- of patches, testing of patches, and staged de-
tection. Good practice entails understanding: ployment to minimise the risk of disruption.
• What systems are involved: their role, where • Remote access be logged and managed ef-
they are located, who owns, manages and fectively. This involves maintaining an in-
supports them, and how they interact. ventory of connections, restricting access to
• The threat: identify and evaluate the threats specified machines,users and times,auditing
facing the process control systems. and systematically reviewing access.
• The impact: identify potential consequences • A variety of user orientated measures be
of a breach of security. put in place. This includes personnel back-
• How the systems are vulnerable: this includes ground security checks, procedures for issue
networks, applications, remote access con- and change of passwords, training, authori-
nectivity, etc. sation of new users and removal of former
2. Implement secure architecture. users.
The objective is to implement appropriate se- • There be proper documentation for access
curity protection measures to provide a secure control.
operating environment for the control system. • Effective back-up and recovery procedures
Good practice requires that: are in place.
358 49 Open Systems

• A variety of physical security measures are • Control engineers develop IT security skills
put in place.Typical examples are drive locks, and commit to system security procedures.
tamper proof casings,intruder alarms,access • Links be established between IT personnel
control systems, CCTV, etc. and control teams to build working relations,
• Control system activity be monitored to indi- share skills and facilitate knowledge transfer.
cate health of the system. This involves mon- 5. Manage third party risks.
itoring network activity and time taken for The objective is to ensure that all security risks
specific tasks against baselines for normal from suppliers,contractors and other third par-
operation. ties are managed. Good practice requires that:
3. Establish response capabilities. • All third parties that have legitimate access
The objective is to establish procedures for to the system should be identified.
monitoring, evaluating and taking appropri- • The basis of third party access be de-
ate action in response to security events. Good tailed contractually at the procurement stage,
practice entails: defining the terms of the connection and
• Forming a computer emergency response prompt notification of vulnerabilities.
team (CERT) to respond to suspected se- • Third parties agree to be bound by the end-
curity incidents. Responses may include in- users security regime.
creased vigilance, isolation of control sys- • System suppliers agree to provide anti-virus
tems and application of patches. protection,security support and patches,and
• Ensuring that appropriate security response agree to system hardening procedures.
and business continuity plans are in place • Other third parties be prevented from hav-
for the control systems, and that the plans ing access to the control systems until their
are maintained, rehearsed and tested. equipment, systems and software is proven
• Establishing an early warning system to no- to not be a security risk.
tify appropriate personnel of security alerts • There be regular security audits and reviews
and incidents, and ensuring that all such of third party access.
warnings are formally recorded and re- 6. Engage projects.
viewed. The objective is to ensure that any project that
4. Improve awareness and skills. may impact on control system security is iden-
The objective is to increase process control se- tified and that, early in the project’s life cycle,
curity awareness throughout the organisation appropriate security measures are included in
and to ensure that all personnel have the ap- its design and specification. Good practice in-
propriate knowledge and skills to fulfil their volves:
role. Good practice requires that: • Identifying all projects and developments
• Management understands the business im- that could potentially have an impact on the
plications of the security risk to control sys- control system’s security.
tems and therefore commits to the manage- • Ensuring that a named individual has re-
ment of the risk and provision of tools and sponsibility for security risk management
training. throughout the project life cycle.
• IT personnel understand the differences be- • Addressing security issues in the URS and
tween the security of control systems and IT DFS documentation and subsequent con-
security in general. For example, control sys- tracts, and ensuring that security policies are
tem operations cannot be suspended whilst adhered to.
patches are installed or reboots made to en- • Carrying out security reviews and testing se-
able upgrades. curity at key points in the control system’s
development cycle.
49.11 Firewalls 359

7. Establish on-going governance. that separation is unlikely to be effective without


The objective is to provide clear direction for careful design, configuration and management.
the management of risks to control system se- The rest of this section deals with those issues.
curity and to ensure on-going compliance and
A firewall can be a separate hardware device phys-
review of policy and standards. Good practice
ically connected to a network, a combined hard-
requires that:
ware and software function unit, or even a com-
• The roles and responsibilities of all con-
pletely software based solution installed on the
cerned with the control system’s security are
host machine to be protected. The first two cat-
defined.
egories, separate hardware or combined hardware
• Security policy and standards be defined,
and software, are referred to as network firewalls
documented and disseminated.
and typically provide the most secure solution for
• Procedures be put in place for the manage-
the separation of control and IT networks. They
ment of the policy and standards, which in-
can be hardened to resist all but the most inge-
cludes provision for their occasional review.
nious assaults and offer the best firewall manage-
This may all seem to be rather tedious: yes, but ment options.
unfortunately necessary. Gone are the days when As stated, messages (network traffic), com-
IT security of control systems could be taken for prised of packets of information, are routed
granted. through the network firewall. Each packet con-
sists of a header (source and destination addresses,
status information, etc.), data and a trailer, as de-
49.11 Firewalls scribed in Chapter 40. A firewall, upon receiving
such a packet, analyses its characteristics and de-
It is evident that effective firewalls are fundamental termines what action to take. The firewall decides
to information security management. The NISCC whether to allow it through immediately, buffer it
commissioned a guide to good practice on the de- temporarily,redirect it elsewhere or to block it.The
ployment of firewalls in SCADA and process con- decision is based upon a set of rules, referred to as
trol networks which has subsequently been pub- access control lists (ACL).
lished. According to their ACL sophistication,firewalls
This NISCC (2005) guide makes the point can be classified as follows:
strongly that there is more to deploying a firewall at
the interface between an IT network and a control 1. Packet filter firewalls. This is the simplest type
system than meets the eye. The two central issues of firewall. It uses so-called static rules to check
are that: the internet protocol (IP) addresses and port
numbers of the packets on an individual basis.
• The goals of IT and process control personnel This approach, known as static filtering, lacks
can be fundamentally different: the IT world the ability to understand the relationships be-
sees performance and data integrity as being tween a series of packets and is the most readily
paramount whereas,ultimately,the control com- “hacked into” type of firewall. It is the cheapest
munity’s commitment is to issues such as op- type of firewall but, in its favour, happens to
erability, quality, reliability, safety and viability. have the least impact on performance.
These differences in perspective, which can po- 2. Stateful firewalls. This is a more sophisticated
tentially lead to conflicts in security practice, type of firewall. It tracks the interrelationships
have been noted and addressed in the previous between packets allowed through it. By keeping
section. a history of accepted packets and being aware
• Whilst it is recognised as good practice that IT of the state of current connections, it can ac-
and control networks be separated by firewalls, cept only anticipated messages. The power of
360 49 Open Systems

this approach, known as dynamic packet filter- The current position is that most firewalls on
ing, is due to the fact that the rules can be made the market use a combined stateful and appli-
conditional. For example: a packet will only be cation proxy approach.
accepted for a particular destination if it was 4. Deep packet inspection (DPI). A DPI firewall
received in response to a specific request for a offers deeper filtering into the application layer
certain type of data sent to a particular source than the traditional proxy firewall, without per-
address. forming a full proxy on the TCP connection.For
Stateful firewalls offer a high level of security, example, DPI firewalls can inspect simple ob-
good performance and transparency to users. ject access protocol (SOAP) objects in XML on
However, they are more expensive and, because web connections and enforce policy on what
of their complexity, can be less secure than objects are allowed through the firewall. This
packet filters if not administered by competent firewall market is still in development.
personnel. Firewall suppliers usually offer other services be-
3. Proxy firewalls. These work at the application sides their basic message handling functionality.
layer of the OSI model as described in Chap- Such services may comprise intrusion detection,
ter 40. The packets are opened, processed ac- deployment of anti-virus software, authentication
cording to ACL rules, reassembled, and for- services, secure encrypted “tunnels” and network
warded to the intended target device. The fire- address translation. These additional services ob-
wall is typically designed to handle a variety viously increase the cost and complexity and re-
of protocols, through the one device, and then duce the performance of the system. However,
forward the messages to individual host com- making good use of them can significantly improve
puters for servicing. Thus, instead of connect- the overall security of the control system.
ing directly to an external server, the client con-
nects directly to the proxy firewall which in turn
initiates a connection to the requested external
server.
49.12 Demilitarised Zones
Proxy firewalls can provide significant addi- There are various architectures available for de-
tional security functionality. For example, ACL ploying a firewall between an IT network and
can be used to require users or systems to pro- a control system. These configurations involve
vide additional levels of authentication before routers and switches, multiple ports, single and
access is granted. Also rules can be created that multiple firewalls, and demilitarised zones (DMZ).
are protocol specific. For example, a proxy fire- Of these, on the grounds of security, manageability
wall can be used to block all inward bound and scalability, the DMZ configurations are over-
HTTP messages that contain scripts whereas, whelmingly the most effective. One common DMZ
by contrast, a filter based firewall could block configuration is depicted in Figure 49.4.
all HTTP messages, or none, but not a subset. This configuration requires that the firewall
Whilst proxy firewalls offer a high level of secu- has three or more ports. Thus one port is used
rity, they do have a significant impact on net- to interface with the control system, a second with
work performance. Furthermore, most proxy the IT network, a third to an intermediate local
firewalls only support common internet proto- area network referred to as a process information
cols, such as file (FTP), hypertext (HTTP) and network (PIN) and possibly a fourth to either a
simple mail (SMTP) transfer protocols. Thus wireless local area network (WLAN) or remote and
messages based upon control protocols such as third party access systems.
common industrial protocol (CIP) and Mod- Common servers such as history (HM) and
bus/TCP, etc., will still require the firewall to application (AM) modules would typically be lo-
process the messages by filter or stateful means. cated on the PIN and remote users would have le-
49.13 Malware Summary 361

FS1 WS Host PC1 FS1 WS Host PC1

Ethernet Ethernet
DMZ
PIN DMZ
PIN FW GW1 FW1

HM AM
HM AM FS 2 GW1 PC2 OCS FW2 PC2
OCS
FS 2

Highway Highway

PCU PLC SLC Fieldbus PCU PLC SLC Fieldbus


GW2 GW2

Fig. 49.4 Demilitarised zone with single firewall Fig. 49.5 Demilitarised zone with twin firewalls

gitimate access to them via the internet and the proach is increased cost and management com-
firewall. Likewise, for updating and/or application plexity.
purposes, the control system has access to these If firewalls from different suppliers are used
modules via the gateway and firewall. By locating then the diversity of design provides enhanced se-
the HM and AM modules inside the DMZ,no direct curity.Indeed,the obvious direction for the control
communication channels are required between the industry to evolve is for gateway design and fire-
IT network and the control system: each effectively wall functionality to become integrated within the
ends in the DMZ. The objective of ACL design is same physical unit.
to maintain a clear separation between the IT net- An extension to the concept of diverse firewalls
work and control system. is the use of disjoint protocols across the DMZ.
The primary security risk with this particular Thus, for example, if Ethernet is used for the IT
architecture is that if one of the modules inside network it is explicitly not allowed between the
the DMZ is compromised, it can be used to launch DMZ and the control network. Likewise, if token
an attack on the control network. This risk is ob- bus is used for the highway, then it is explicitly not
viously reduced by hardening the devices on the allowed between the DMZ and the IT network.
PIN and by actively keeping the firewall itself up to Once the firewall architecture is fixed, the main
date. focus of effort is in determining what traffic to al-
An alternative DMZ configuration, which uses low through the firewalls. The NISCC (2005) guide
a pair of firewalls between the IT network and the provides detailed guidance on recommended prac-
control system, is as depicted in Figure 49.5. tice for the design of ACL rule sets and on the man-
Again, common servers such as the HM and agement of firewalls.
AM are located on a PIN within the DMZ. The first
firewall FW1 provides security at the IT network
interface and the second firewall FW2 secures the
interface with the process control network. An at-
49.13 Malware Summary
tractive feature of the twin firewall approach to Malware is the generic term that refers to viruses,
DMZ is that it allows both IT and control groups to trojans, worms, etc. A virus is a program, or macro,
have clearly separated device responsibility since that is capable of attaching itself to files and repli-
each can independently manage its own firewall. cating itself repeatedly, typically without the user’s
The principal disadvantage of the twin firewall ap- knowledge or permission. Some viruses attach to
362 49 Open Systems

files such that when the file is executed so too is date such as Friday 13th. When the event oc-
the virus. Other viruses sit in a computer’s mem- curs, the virus activates and does its damage.
ory and infect files as they are created, opened, 6. Stealth. This type hides itself by feeding anti-
edited, copied, etc. They may display symptoms virus software a clean image of infected files
and/or cause damage, but neither symptoms nor or boot sectors. For example, the size of an in-
damage are essential in the definition of a virus: a fected file would be returned as the size of the
non-damaging virus is still a virus. file without its virus.
Viruses spread from computer to computer via 7. Trojan. This is a malicious program that pre-
network connections, via shared storage media tends to be benign and causes an application to
such as file servers and via portable storage me- behave in an unpredictable way. Strictly speak-
dia such as compact discs and USB sticks. By far ing, a Trojan is not a virus because it does not
the most common form of infection is by viruses replicate.
attached to e-mails. The effects of virus infection 8. Worm. This is a parasitic program which repli-
are various and include: cates but, unlike a virus, does not infect other
programs or files. It can replicate itself on the
• Just leaving a simple screen message same computer or send copies to other com-
• Accessing e-mail address books, replicating puters via a network, typically as an e-mail at-
messages to every address, and overloading the tachment.
network
• Deleting and/or corrupting files

There are many virus variants:

1. Boot Sector Infector. This virus infects the boot


49.14 Anti-Virus Software
sector of a disc which contains the boot record Anti-virus software scans a computer’s memory
which is used by the computer to boot itself up. and disc drives for viruses. If a virus is found, the
When the computer reads and executes the pro- software informs the user and may wipe clean, dis-
gram in its boot sector, the virus is transferred infect or quarantine any files, directories or discs
into memory and gains control over basic com- affected. Detection is by means of signature scan-
puter operations. ning using a so-called signature file. The file holds
2. Encrypted. The virus’ code begins with a de- a search pattern, often simple strings of characters
cryption algorithm: the rest of the virus is in and bytes, for every known virus. Signature files
encrypted code. Each time it infects, it auto- are huge and growing. Generally speaking, anti-
matically encodes itself differently and thus at- virus programs will detect 100% of known viruses,
tempts to avoid detection by anti-virus soft- provided the signature file is up to date: it is their
ware. ability to detect unknown ones that is critical.
3. File. This type of virus usually replaces or at- Disinfection reverses the effects of viruses.This
taches itself to .com and .exe files. Most are res- requires a complete understanding of what the
ident. virus does when it infects. Once detected, the virus
4. Macro. A macro is a series of instructions de- is removed from the system and, whenever pos-
signed to simplify repetitive steps. A macro sible, the affected data is recovered. Disinfection
virus is typically attached to a document file, alone is considered to be inadequate because the
such as Word or Excel. When the document is user may inadvertently re-introduce a virus.
opened, the macro runs, does its damage and Anti-virus software therefore includes live ac-
copies itself into other documents. tivity checking (LAC) in the operating system ker-
5. Resident. A resident virus loads into memory nel which monitors all operating system activity
and remains inactive until triggered, say by a for viruses. Modern systems are invariably sup-
49.15 Comments 363

plied with LAC already installed in the operating 49.15 Comments


system. An alternative approach is to use a back-
Open systems are concerned with the unrestricted
ground file pattern scanner which intermittently
access to data and interoperability. They enable the
checks a system’s hard disc for virus signatures. If
integration of control and information systems. It
the background scanner is effective there should be
is evident that most of the prerequisites for open
no need for LAC too. However, in practice, LAC is
systems in the form of industry standards for op-
invariably used because of the potential for intro-
erating systems, communications, programming,
ducing a virus during the installation or updating
display and so on already exist. The move towards
of anti-virus software.
open systems is being driven by strong commer-
cial pressures. However, protection against unau-
thorised access and malicious intent is a funda-
mental constraint. The scope for damage is huge.
The cost of protection will rise inexorably and, in
years to come, the notion that system’s used to have
open access will be seen to be quaint.

You might also like