Software technology tools can help lower cyber security risk
Software tools help control access by providing capabilities like authentication and role-based authorization.
Software tools like the Rockwell Automation FactoryTalk Security enabled software suite help control access by providing capabilities like authentication and role-based authorization. This service verifies the identity of each user who attempts to enter the automation system and grants access only to those authorized to perform particular actions on a system’s features and resources.
With a configuration environment from Rockwell Automation (Rockwell Software RSLogix 5000 software), you can control access down to the individual module or user-defined add-on instruction. Engineers simply assign a unique source key (or password) to the modules or add-on instructions they wish to protect. A common source key can be used for all the routines or add-on instructions, or unique keys can be assigned to each.
Once a source key is assigned to a specific routine or add-on instruction, that source key is added to the source code and encrypted. This protected source is stored and maintained by configuration software with the encrypted source key remaining in the source even when downloaded to the controller. Attempts to export the protected source will result in an encrypted file that cannot be interpreted. When re-imported, this code remains protected by the original source key.
FactoryTalk, Rockwell Software, and RSLogix are trademarks of Rockwell Automation Inc.
- Brad Hegrat is principal security consultant, Rockwell Automation. Edited by Mark T. Hoske, content manager CFE Media, Control Engineering, Plant Engineering, and Consulting-Specifying Engineer. Reach him at mhoske(at)cfemedia.com.
Information access versus security - related article, linked below.
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.