Security module addresses government SCADA concerns

Byres Security Inc. and MTL Instruments, a division of Cooper Crouse-Hinds, introduced the Tofino Modbus TCP Enforcer Loadable Security Module (LSM) at the ISA show this week in Houston, TX. The module performs detailed analysis and filtering of all Modbus TCP messages and is certified by Modbus-IDA.

11/01/2008


Byres Security Inc. and MTL Instruments, a division of Cooper Crouse-Hinds, introduced the Tofino Modbus TCP Enforcer Loadable Security Module (LSM) at the ISA show this week in Houston, TX. The module performs detailed analysis and filtering of all Modbus TCP messages and is certified by Modbus-IDA.

“Deep packet” or “content” inspection for Web email or traffic has been offered in IT firewalls for several years, but similar capabilities have not been available for the process control or SCADA world. Modbus traffic could either be allowed or blocked by a standard firewall, but fine-grained control was not possible, said Eric Byres, CTO at Byres Security Inc. “And since the smooth flow of Modbus TCP traffic is critical to the average industrial facility, engineers usually opted to let everything pass and take their chances with security,” he added.

This detailed level of analysis and filtering in SCADA systems has recently become a government-level concern. This year, the U.S. Department of Homeland Security warned: “A vulnerability has been identified and verified within the firmware upgrade process used in control systems deployed in critical infrastructure and key resources (CIKR)…development of a mitigation plan is required to protect the installed customer base and the CIKR of the nation. Firmware vulnerability mitigation steps [include] blocking network firmware upgrades with appropriate firewall rules.”

Two global energy companies and a major transportation company have thus far tested the Tofino ModbusTCP Enforcer LSM and are reportedly pleased with how it allows them to follow the government’s guidance and enhance both the security and stability of their systems. They have been able to restrict Modbus functions in numerous ways:

  • Blocking all firmware upgrades, while allowing normal HMI traffic;

  • Tailoring appropriate Modbus access permissions to PLCs for different stations, such as read-only for monitoring panels, read/write for HMIs, and full programming and diagnostics access for PLC engineering workstations;

  • Restricting Modbus access permissions to specific memory locations in a controller;

  • Providing enhanced security and protection for any Modbus TCP device, including filtering of invalid traffic that could cause denial of service or system failures; and

  • Enforcing read-only access to safety instrumented systems for enhanced isolation and safety.

www.byressecurity.com

www.mtl-inst.com

www.modbus.org





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me