L03 - Design, Implement, and Manage FactoryTalk Security



Similar documents
Industrial Security Solutions

System Configuration Guide

Logix5000 Controllers Security

Observe your factory process automation Automation University 2014 AUD 17

AUD17 Versions- und Änderungsmanagement, Audit trails und Disaster Recovery in Produktionsanlagen mit

L26 - FactoryTalk AssetCentre: Self-Paced Lab. For Classroom Use Only!

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications

AssetCentre. Maximize Your Automation and Process Investment. Overview

T46 - Integrated Architecture Tools for Securing Your Control System

Logix5000 Controllers Security

AssetCentre. Asset Management GETTING RESULTS GUIDE INTEGRATED PRODUCTION & PERFORMANCE SUITE

SHORT TRAINING COURSES

L06 - FactoryTalk View Site Edition - Building Applications Lab. For Classroom Use Only!

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Managing FactoryTalk Security for Multiple FactoryTalk View Studio Applications

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Virtualized System Reduces Client s Capital and Maintenance Costs

How To Manage Security On A Networked Computer System

Simplifying the Transition to Virtualization TS17

Design, Operate, and Maintain Your Logix/Factory Talk HMI System

Title Goes ASSET MANAGEMENT

View Site Edition INSTALLATION GUIDE. PUBLICATION VIEWSE-IN003L-EN-E August 2014 Supersedes Publication VIEWSE-IN003K-EN-E

FactoryTalk View Site Edition V5.0 (CPR9) Server Redundancy Guidelines

IT Sr. Systems Administrator

VantagePoint Getting Results Guide

User Manual. DeviceNet Network Configuration

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

COMPLETE COMPUTING, INC.

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

05.0 Application Development

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack B; 5 days, Instructor-led

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Securing Data on Microsoft SQL Server 2012

Table of Contents. Introduction. Audience. At Course Completion

CipherShare Features and Benefits

FactoryTalk Historian Site Edition Architectures and Design Considerations

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Course: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services

FactoryTalk Historian SE v2.1 (CPR9 SR1) Redundant Interface Configuration Guide

M6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

Managing and Maintaining a Microsoft Windows Server 2003 Environment

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

PR03. High Availability

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

PowerLink for Blackboard Vista and Campus Edition Install Guide

Author: Ryan J Adams. Overview. Policy Based Management. Terminology

Neutralus Certification Practices Statement

The course covers Windows server 2008, Windows Server 2008 R2 and Windows Server 2008 R2 sp1.

RSLinx Enterprise GETTING RESULTS GUIDE. PUBLICATION LNXENT-GR001K-EN-E August 2014 Supersedes Publication LNXENT-GR001J-EN-E

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Achieving PCI-Compliance through Cyberoam

What s New Guide. Active Administrator 6.0

INSTALLATION AND CONFIGURATION GUIDE. Rockwell Automation Publication HSE-IN025A-EN-E September 2013

Active Directory Services with Windows Server MOC 10969

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Active Directory Services with Windows Server

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

AlarmsandEvents SYSTEM CONFIGURATION GUIDE INTEGRATED PRODUCTION & PERFORMANCE SUITE. PUBLICATION FTAE-RM001H-EN-E December 2014

AssetCentre. Asset Management INSTALLATION GUIDE INTEGRATED PRODUCTION & PERFORMANCE SUITE

How To Configure An Active Directory Domain Services

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack

TIA Portal vs Studio 5000

ABOUT THIS COURSE AT COURSE COMPLETION PREREQUISITES COURSE OUTLINE. Core Solutions of Microsoft Exchange Server 2013 Duration : 5 days

T101 - Migrating your HMI System

EMC DATA DOMAIN ENCRYPTION A Detailed Review

FactoryTalk Gateway Getting Results Guide

MySQL Security: Best Practices

DriveLock Quick Start Guide

Course Outline: 6433 _ Planning and Implementing Windows Server 2008 Clustering

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Division of IT Security Best Practices for Database Management Systems

סילבוס -MCITP מנהלי רשתות

GE Measurement & Control. Cyber Security for Industrial Controls

Integrated Architecture Design and Configuration Tools

M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

Stratix Switches Within Integrated Architecture. Dave VanGompel, Principal Application Engineer

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

GE Measurement & Control. Cyber Security for NEI 08-09

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Computer System Security Updates

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Transcription:

L03 - Design, Implement, and Manage FactoryTalk Security PUBLIC PUBLIC - 5058-CO900G

Background: What is FactoryTalk Security? Use FactoryTalk Security to Manage the insider threat by authenticating the user and authorizing the use of Rockwell Automation software applications to access automation devices (Step 1) Request Access Security Authority (FactoryTalk Directory) (Step 2) Access Granted or Denied (Step 3 - optional) Authorize access to specific devices (All FactoryTalk Security enabled software) How does it work? PUBLIC Provides a security authority to verify identity of each user and grants or deny user's requests to perform a particular set of actions on resources within the system. User Roles (FT groups or Windows groups) User Accounts (FT users or Windows users) Computers and Computer Groups System Policies (plant wide) Product Policies Controllers to be secured Secure Controllers by Area (resource groups) 2

3 Let s Learn about Fred Creating User Accounts Fred ; user name and PW

4 Let s Learn about Fred FactoryTalk System Policies Fred s PW expires in 30 days

5 Let s Learn about Fred Assigning Users to a Group or Role Fred is an Engineer

6 Let s Learn about Fred Assign FactoryTalk Software Permissions Fred can use Logix Designer

7 Let s Learn about Fred Assign Groups or Roles Permissions Engineers can Modify AOI s

8 Let s Learn about Fred Resource Assignment to Areas of Applications Finally; Fred is an Engineer who can Modify AOI s on all controllers in Area2

FactoryTalk Security in Logix Controllers Using the Security Authority Identifier (SAID) With FactoryTalk Services Platform SR5 and Logix V20 (and later) Configures Logix Controllers to require that all users be authenticated from a specific instance of the FactoryTalk Directory before they can access the controller (Security Authority Identifier) Security Authority Identifier gets stored in the project ( project binding ) secures the offline file Anyone working on a project (on-line or off-line) with the Security Authority ID required box checked Is first required to Log On.. using the FactoryTalk Directory used to secure the project PUBLIC 9

Backing up the SAID Use the FactoryTalk Administration Console, the Security Authority Identifier can be Encrypted with a passphrase or password to allow for secure backup copies (disaster recovery) Allows secure duplication and distribution to allow multiple FTDirectories to share the same ID! Can be used to replace the CPU Lock functionality that was deprecated in v20 The Security Authority Identifier looks like this

Copyri Secure Slot for Communications

12 Pick and Choose: Data Access Control Users can assign External Access settings of Read/Write, Read Only, or None to tags Useful to control which tags can be modified from an HMI or other external application A cryptographically licensed trusted connection is established between RSLogix TM 5000 and the Logix controller Ensures the External Access attribute can only by changed by RSLogix 5000 Who can use RSLogix 5000 to change this attribute controlled by FactoryTalk Security Users can also define tags as Constants Constants can not be modified by controller logic Improves security of tags especially when used in conjunction with FactoryTalk Security

13 Pick and Choose: FactoryTalk View SE Security FactoryTalk View SE Security can be applied to: Displays

14 Pick and Choose: FactoryTalk View SE Security FactoryTalk View SE Security can be applied to: Displays Objects

15 Pick and Choose: FactoryTalk View SE Security FactoryTalk View SE Security can be applied to: Displays Objects Applications

Pick and Choose: ControlLogix Real-Time Change Detection Real-time monitoring of ControlLogix V20 or higher for changes via Audit Value On Detect will get activities via controller Change Log On Detect complete will consolidate all activities in a Report via Event Log Will detect Rogue changes Optionally can send to Audit log as well

17 Pick and Choose: FactoryTalk AssetCentre Audit / Change Reporting Search FactoryTalk AssetCentre Events Audits Archive history Schedule a Report or Run Now Email reports per a Schedule Examples Search audit log for changes made during last four hours to a specific asset that has failed Search archive history to determine what files a user has modified during last month Search event logs for upload tasks that failed Search audit log at the end of every shift for any forces or empty branches to improve plant-floor safety

18 Lab Layout - Sections Main Sections of the Lab: 1. FactoryTalk Overview: Everyone Must Complete 2. Deploy Initial RSLogix Project to Controller: Everyone Must Complete 3. Securing RSLogix 5000: Everyone Must Complete 4. FactoryTalk View SE Security: Pick & Choose 5. Securing Controller Data & Access: Pick & Choose 6. Protecting RSLogix 5000 Source Code: Pick & Choose 7. Real-Time Change Management for ControlLogix: Pick & Choose

19 Lab Layout - Sections Main Sections of the Lab: 1. FactoryTalk Overview: Everyone Must Complete 2. Deploy Initial RSLogix Project to Controller: Everyone Must Complete 3. Securing RSLogix 5000: Everyone Must Complete 4. FactoryTalk View SE Security: Pick & Choose 5. Securing Controller Data & Access: Pick & Choose 6. Protecting RSLogix 5000 Source Code: Pick & Choose 7. Real-Time Change Management for ControlLogix: Pick & Choose