Secure OPC keeps attackers at bay

Automation systems remain vulnerable and exposed. Past experiences like Stuxnet and last month’s revelations about SCADA system vulnerabilities show networks are sitting ducks to any aggressive and sophisticated attack.


Automation systems remain vulnerable and exposed. Past experiences like Stuxnet and last month’s revelations about SCADA system vulnerabilities show networks are sitting ducks to any aggressive and sophisticated attack.

That all comes on the heels of decades of living in an environment where attacks happened to other companies in other industries. Not manufacturing. Those days are over.

The use of common-off-the-shelf networking, computer and software technologies increased business agility and reduced costs, but it also hiked the demands to balance the need for accessibility to control system data with the need to safeguard the integrity and usability of mission critical systems, according to a new white paper just released by MatrikonOPC and Byres Security.

In this case, the phrase “less is more” comes to mind as one of the most effective ways to manage the conflict between the demands of efficient access and the demands of effective security is to minimize the interfaces and protocols operating between the control system and external networks.

Having one approved connectivity solution serving multiple corporate requirements not only reduces administration costs, but also reduces the opportunities open to the attacker. This is known as “reducing the attack surface” of a system, according to the white paper.

That is where OPC comes in. OPC is the most widely used standard that addresses the demands of universal data access in the industrial automation environment.

By layering defenses that are OPC-aware, high security solutions can meet the security and access expectations of a company, all without administrative overload on the network or controls team. The result is a standards-based solution proven across numerous control systems.

The new white paper entitled “Effective OPC Security for Control Systems,” written by Eric Byres, chief technology officer at Byres Security Inc. and Darek Kominek, Manager, OPC Marketing, MatrikonOPC, talks about the security advantages of limiting network interfaces and protocols, and recommends using OPC as a communications standard because of its ease of use and its widespread deployment.

The white paper goes on to discuss how different defensive layers can provide high security when using OPC technology.

Click here for a complete white paper on OPC security.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle