IT in Manufacturing


Productivity through security

September 2013 IT in Manufacturing

A good SAM (secure access manager) solution is focused on delivering productivity gains for administrators and users while achieving the highest level of security and compliance in managing, securing and reporting on remote device access. A SAM solution addresses the need for secured remote access to remote field IEDs (intelligent electronic devices), for maintenance, configuration and data retrieval. The benefit of using a SAM, as opposed to standard remote access such as a VPN, is the added security and control it provides.

Authentication and encryption control

This type of solution allows a native IED application to communicate with its associated devices as if the user were connected directly to the remote device in the field. The SAM solution will provide control over the authentication and encryptions necessary and will create a transparent tunnel between the application and the IED, over almost any Ethernet infrastructure (LAN, MAN, WAN).

The overall solution will control user groups, individual users and their passwords, including password changing if required. Rather than an end user logging directly into an IED with the IED specific username/password combination, they will instead log into the SAM server using their unique username and password. Once authenticated to the SAM it will show a list of devices the user is allowed to connect to that have been configured by the solution administrator. The user can then select the device they want, as well as the application they wish to use to connect. These applications should be able to run off the user’s computer directly, or alternatively, the solution should support thin-clients, where the clients will not have the application installed directly, instead they will run it off the main server.

One of the benefits of running a SAM solution is that users do not have to remember a variety of different usernames and passwords for end devices, rather they just need their SAM username and password to connect to any device. Being able to control what devices a user is allowed to connect to, as well as the ability to log details such as login attempts on a per user basis, provides a much more secure network environment, one that is protected against accidental changes (if the user connects to the wrong end device without realising) or malicious changes (which can be enacted by a disgruntled or ex-employee that still has access to site).

Automated functionality

Extending the functionality that allows users to tunnel through the SAM to connect to an end device, a good SAM solution will also be able to automate certain routine functions, such as data/file retrieval and password/configuration management. This extends the benefits of using a good SAM solution from securely managing user access to reducing travel to remote sites for data retrieval and configuration management.

Once file and configuration retrieval from end devices is in place, the SAM can use intelligence to query these files and configurations and to compare them to existing master files. So, for instance, if the configuration of a unit is changed, either intentionally or accidentally, the SAM will detect that there is a mismatch between the devices configuration and the master for that device or device group. An alert can then be generated to relevant users who will be able to identify the changes using the SAM and either confirm or deny these. If confirmed the new configuration can be stored as the master, whereas if the change is denied the old master firmware can be re-uploaded to the device.

RuggedCom’s Crossbow SAM solution

The system will usually consist of a central server along with multiple users. These users will generally be the engineers PCs or laptops, running a client application to connect to the server. The server will contain the system database (e.g. based on SQL server), as well as storing all configuration files. Depending on the requirements, either the server can host the IED applications (thin-client scenario) or alternatively these can be hosted directly on the client machines.

As a SAM solution is used to provide remote access, a problem can occur if a station loses its link to the central location where the SAM server is stored. As the device passwords are unknown to the system users (this is automated by the SAM), loss of connectivity to the SAM can mean that the users are not able to log into the end devices. A good SAM solution will solve this dilemma by having redundant, partial functionality servers that are stored locally within each station, often known as SACs (station access controllers). Partial functionality means that although the user may not have the full intelligence and automation functions of the SAM available, they will still be able to login to end devices through the SAC and so are still able to troubleshoot and resolve problems. If a solution using SACs is considered, it is essential to make sure that the SAC applications are installed on servers that can handle the substation environments, as losing this SAC as well as connection to the SAM can cause problems. Often it is advised to install the SAC on an industrial or embedded PC that is rated for high EMI resistance.

An example of RuggedCom’s Crossbow SAM solution topology is shown in Figure 1. As can be seen, the SAM is located in the control centre along with the various authentication servers if required. All communications to remote relay and RTUs will pass through the SAM, which will tunnel the connections from the clients in the control room to the remote end devices in the field. The RX1500 gateway supports an embedded industrial PC that can run the SAC, allowing access even if the uplink to the control centre is down. Typical SAM system benefits include:

* Individual user accounts and privileges.

* Strong authentication for users.

* Global password management of relays and gateway devices

* Configuration and firmware management of relays and gateway devices.

* Integrated file management provides controlled access, version control and history for all file types.

* Support for third party security event management systems.

* Blocking of specified IED command improves security and reduces errors.

* Automatic, scheduled retrieval of important IED event files.

* Preserves investment in legacy gateway devices and communication infrastructure.

* Administration tools supports management of thousands of IEDs and hundreds of users.

* Meets NERC CIP standards for cyber security.

* Integration with Active Directory, RSA SecurID and other enterprise authentication solutions.

For more information contact H3iSquared, +27 (0)11 454 6025, [email protected], www.h3isquared.com



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...
Trends shaping the future of cloud in South Africa
IT in Manufacturing
The cloud has emerged as a fundamental and transformative component of modern business infrastructure. It has fundamentally changed how organisations operate and innovate. In South Africa, this trend is particularly pronounced, with most businesses adopting multi-cloud strategies to enhance their agility and competitiveness.

Read more...