Analyzing security in industrial automation systems#
Security principles#
Based on the preparation:
- Principle of least privilege
… requires that every component of a computer system, e.g., program, user, must be able to access only the information and resources that are necessary for its purpose.
- Fail-safe
A design feature or practice that, in the event of a failure of the design feature, inherently responds in a way that will cause minimal or no harm to its environment.
- Open design
A design which is publicly available so it can be built or understood.
- Segmentation
Division of a system into multiple isolated subsystems. Different subsystems can have different security requirements.
- Usability
Capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience.
E.g., users use post-its if the password requirements are hard to remember.
- Attack surface
The sum of a software environment’s different points where an attacker can try to enter data to, extract data from, or control a device or critical software.
We should minimize the attack surface.
- Secure by default
All the security features of a system are turned on when a product is delivered.
Activity#
Activity 61 (Analyzing attack surface)
Open the diagram on Guide to Operational Technology (OT) Security - Section 2.3.4 Programmable Logic Controller-Based Topologies
You see the following components on the diagram:
Engineering WorkstationData Historian, i.e., Operational historianPhoto Eye, i.e., Photoelectric sensorHMI, i.e., human–machine interface; a kind of user interfaceServo Drive, Variable-frequency drive, i.e., motor controller electronics
We have in the laboratory the following components:
Robot arm
Gripper
Sensors, e.g., photoelectric sensors, limit switch, camera for object identification
Pendant
Ethernet cable
Your computer
Match the laboratory components to the components in the diagram. In other words, which component on PLC control system implementation example represents which component in our laboratory?
Draw a similar diagram using the components in our laboratory. Also include the human user.
- Attack vector
A specific path, method or scenario that can be exploited to break into an IT system. The term was derived from the disease vector in biology.
Examples:
phishing leading to unauthorized access to a computer
malware infection resulting in manipulation or stealing of a database
exploiting a security vulnerability in a PLC’s administrative web interface causing denial of service or unwanted control actions, e.g., driving the motors above their limits.
Identify potential attack vectors on the diagram you have drawn.
Imagine that your attack vectors are successful. List at least three consequences. Example perspectives: IT, OT, business.
Pick at least three principles from the section Security principles to secure your system against the attack vectors you have chosen.