How To Secure Your Computer With Libreware Libreroview 2.5.2.2 (Windows) And Libreros (Windows 2) (Windows 3.5) (For Windows) (Powerpoint) (Networking)



Similar documents
Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time

Best Practices for Deploying, Replicating, and Managing Real-Time and FPGA Applications. ni.com

Embedded System Deployment and Management

Medical Device Security Health Group Digital Output

ni.com Remote Connectivity with LabVIEW

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Introduction to Mobile Access Gateway Installation

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Hardening Guide. Installation Guide

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Introduction to the EIS Guide

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

owncloud Architecture Overview

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Setting Up Scan to SMB on TaskALFA series MFP s.

White Paper. BD Assurity Linc Software Security. Overview

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Medical Device Design: Shorten Prototype and Deployment Time with NI Tools. NI Technical Symposium 2008

Service Manager and the Heartbleed Vulnerability (CVE )

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Installing and Configuring Websense Content Gateway

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Stealth OpenVPN and SSH Tunneling Over HTTPS

Access Your Cisco Smart Storage Remotely Via WebDAV

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Specific recommendations

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Secure Compute Research Environment Data Security Plan (DSP)

Deployment Guide Microsoft IIS 7.0

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

WDM Security Guidelines

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Ovation Security Center Data Sheet

Cloud Security with Stackato

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

FileCloud Security FAQ

McAfee SMC Installation Guide 5.7. Security Management Center

USER GUIDE WWPass Security for Windows Logon

WebEx Remote Access White Paper. The CBORD Group, Inc.

Industrial Security for Process Automation

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security Advice for Instances in the HP Cloud

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Executive Summary and Purpose

W H I T E P A P E R. Best Practices for Building Virtual Appliances

Building A Secure Microsoft Exchange Continuity Appliance

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Security Correlation Server Quick Installation Guide

Document ID. Cyber security for substation automation products and systems

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Locking down a Hitachi ID Suite server

Windows Embedded Security and Surveillance Solutions

Using a VPN with Niagara Systems. v0.3 6, July 2013

Proven LANDesk Solutions

INFORMATION SECURITY TRAINING CATALOG (2015)

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

Comodo Endpoint Security Manager SME Software Version 2.1

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Symphony Plus Cyber security for the power and water industries

Industrial DAQ System for Measurements and Monitoring. Hans-Petter Halvorsen, M.Sc.

TIBCO Spotfire Platform IT Brief

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Security IIS Service Lesson 6

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

October P Xerox App Studio. Information Assurance Disclosure. Version 2.0

Basics of Internet Security

Basics of Simulation Technology (SPICE), Virtual Instrumentation and Implications on Circuit and System Design

Decrease your HMI/SCADA risk

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

Ovation Security Center Data Sheet

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Direct or Transparent Proxy?

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

FireEye App for Splunk Enterprise

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Connectivity to Polycom RealPresence Platform Source Data

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Barracuda SSL VPN Administrator s Guide

Managing Remote Access

Ensuring the security of your mobile business intelligence

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

ipad in Business Security

Transcription:

Addressing Embedded Security in LabVIEW RIO Systems Carlos Pazos Product Marketing Manager Embedded Software

Why Care About Security? 3

Why care about Security? Why Care About Industrial Security? 4

Stuxnet Explained IEEE Spectrum, Feb 26 2013 5

OpenSSL Heartbleed Vulnerability 6

Security is a Shared Responsibility Customers: Define security objectives, assess application-specific risks, evaluate and implement security steps NI: Provide best practices, provide security features that enable deployment in your threat environment, listen to customer s feedback for the future We want to work with our customers to tackle this complex challenge. 7

How much time should be invested in security? 8

Balancing Security with Other Constraints Decision based on level of risk, impact, liability, etc. Security Ease of Use Time & Cost 9

The Challenge Development is hard: Build a system that functions as designed Security is really hard: Build a system that can t be used any other way Examples: Surveillance, theft, impersonation, base of operations A system s security is a function of its weakest link. 10

Layered Model of Security Security can be defined at many layers A breach at any layer can compromise other layers Don t invest in a retinal scanner for your house if you are going to leave your window open Defense in Depth Physical OS Application Network 11

CompactRIO Development Stages Platform Selection System Configuration Application Development Application Deployment Application Maintenance 12

CompactRIO Development Stages Ethernet Development and/or Deployment PC CompactRIO Embedded System 13

Agenda: Security Best Practices 1. Physical Security 2. Network Security 3. Application & OS Security NI Linux Real-Time Physical OS Application Network 14

Physical Security

Physical Security Limit Physical Access Disable or Encrypt I/O Limit environmental/physical access to Host PC and physically enclose the real-time target Disable or require encryption on I/O (USB, CD Drive, etc.) Implement hardware checking USB dongle for IP Protection Digital I/O to validate that enclosure is properly secured 16

Network Security

General Network Security Secure network Isolated network if possible; firewall if you connect to public infrastructure Use web services for network communication HTTPS provides integrity and confidentiality SSL certificate-based authentication between devices Password-based user authentication between services Understand the security risk of network protocols. No authentication nor confidentiality for: Remote Front Panel, Remote VI Server, Network shared variables Mitigation: o Good: Use IP address access control, blacklist Exported VIs o Better: Use lower-layer tunnel (e.g. VPN or SSL) 18

Disabling the FTP Server Only on VxWorks & Phar Lap There is no unsecured FTP by default on NI Linux RT Use Shutdown RT FTP Server VI in your RT application Must reboot to enable FTP server Disable RT Startup App to enable FTP 19

File Transfer: WebDAV Industry Standard Protocol Manage files on targets remotely over HTTP(S) Secure File Access Authentication & Encryption Supported by all modern OSes and Web Browsers LabVIEW API for programmatic access WebDAV File Browser 20

Web Based Configuration and Monitoring Use to access NI Auth settings crio: http://<crio_ip.addr> Host PC http://<host_ip.addr>:3582 21

NI-Auth Users & Permissions Change password on admin account Set permissions on users and groups to restrict users & groups to only activities they are responsible for Currently applicable only to web services and web management 22

Enable SSL Enable SSL for both System and Application Web Servers Turn off HTTP version and rely only on the HTTPS version Select and setup self signed certificates or go through a CA System Web Server available at https://<crio_ip.addr> https://<host_ip.addr>:3581 23

Web Services Security palette Allows web service to retrieve NI-Auth attributes User name Group Permissions Session key (320 bits) Encryption functions that use the session key Secure Remote Password (RFC 2945) using SRP_SHA1 Message confidentiality Message authentication/integrity using third-party HMAC 24

Managing VI Server Access Manage VI Server (TCP) Access to prevent LabVIEW viruses Prevent remote access & execution of code on your PC or RT target For Host PC: Tools» Options» VI Server For crio: use Project Explorer as shown here 25

Application & OS Security

Application Whitelisting Use to regulate code execution on host computer Compute and store checksum in a known good state Compare checksum against table Solutions: CoreTrace Bouncer McAfee Application Control Bit9 Parity Suite Microsoft AppLocker 27

Malicious Code Prevention Security Enhanced Linux (SELinux) 28

GitHub Reference Policy 29

Sensitive Data Protection Options for encrypting data in storage 1. Several individuals offer LabVIEW VIs o Caution: Much slower than C/C++ implementations 2. Use.NET library in LabVIEW o system.security.cryptography library o Add reference to mscorlib.dll 3. Use DLL calls to the host OpenSSL/CAPI library General principle: Ensure the confidentiality of sensitive data through its entire lifecycle. 30

LabVIEW and LabVIEW Real-Time Application Security Remove Block Diagram Remove Block Diagram Build EXEs Build RTEXEs Remove the block diagram: LabVIEW Help: Removing Block Diagrams from VIs Use Build Specifications such as EXEs & RTEXEs Remove the source code and the development environment from host computers on the deployed network 31

LabVIEW FPGA Application Security FPGA Bounds FPGA Safe States Implement bounds checking on FPGA I/O to prevent damage Use an FPGA Watchdog over RT and default to FPGA safe states if something is erroneous on RT 32

NI Linux Real-Time

NI Linux Real-Time Owned and maintained by NI Custom built and optimized for NI embedded hardware o Supports ARM and x64, with cross-compilers provided Easier integration of third-party peripherals and applications as most have Linux drivers or packages available NI Package Repository: download./ni-linux-rt/ o Over 3,000 packages OS source: github.com/ni PREEMPT_RT Enables real-time reliability through pre-emption, priority inheritance, and scheduling Standard approach to real-time performance on Linux 34

Linux Ecosystem Database Security Code Re-use Connectivity Raima SELinux C/C++ Isshd MySQL OpenVPN Shell scripting IPv6 SQLite IP Tables Python SNMP MongoDB System Logging Ruby NTP CouchDB fail2ban Perl netstat denyhost 35

Integration with the Latest Hardware Products Zynq Single-Board RIO Controller for FlexRIO CompactDAQ Controller Compact Vision System NI Linux Real-Time myrio System on Module Quad-core Performance CompactRIO 36..

Key Resources /linuxrtforum Tutorials Documentation Forum for discussions /linux Links to whitepapers Embedded and Desktop uses download./ni-linux-rt/ Package Repository github.com/ni OS Source 37

Next Steps Sign up at /security Leverage online resources: Overview of Best Practices for Security on NI RIO Systems Engage NI with security needs such as security certifications (NERC CIP, IEC 62351, etc.) Use the Best Practices Checklist to evaluate and secure your system 38

Questions? Carlos Pazos Product Marketing Manager Embedded Software carlos.pazos@