OPC Classic applications are often deployed with minimal security hardening implemented on them, due to the difficulties experienced in establishing and maintaining OPC Classic connectivity in more locked-down environments. Whatever security is employed, it is subject to changing conditions, requiring it to be periodically adjusted.
While OPC applications are often kept safe by relying on the layers of security implemented within the infrastructure they operate in, this should not be relied on as the only line of defence. With cybersecurity threats to industrial control systems growing daily, the time for hardening OPC Classic-based data infrastructure is now.
Matrikon’s new ‘Best Practices for Securing OPC Classic Applications’ whitepaper offers concrete security recommendations to enable IT and OT professionals to better secure OPC Classic-based data infrastructure. These recommendations can be used to help prevent unauthorised users and bad actors from compromising the confidentiality, integrity and availability of OPC Classic systems.
The following serves as a teaser of what’s covered in the full whitepaper:
OPC Classic (OPC) applications are used globally as a key connectivity standard for process control systems. This makes them an attractive target for bad actors attempting unauthorised access, or worse, to these systems. Securing OPC communications provides protection from unauthorised users seeking to access or corrupt data from process control systems, or interfere with the availability of process control systems data or devices.
All OPC applications are built on the Microsoft Component Object Model (COM) infrastructure and are therefore considered COM components. As such, they can only run on a Windows platform. The Distributed Component Object Model (DCOM) extends COM functionality to multi-user and network communication scenarios. All COM objects are constrained by the Windows DCOM security framework.
Besides DCOM security mechanisms, a COM client’s ability to connect to servers is also affected by firewalls, local security policies (LSP), Group Policy Objects (GPO), authentication requirements and application identities. In short, anything that affects security on a Windows platform can potentially affect OPC connectivity and communication.
Introduction to Part 2 loop signatures and process transfer functions
Fieldbus & Industrial Networking
The previous series of loop signature articles dealt with the basics of control loop optimisation, and concentrated on troubleshooting and ‘SWAG’ tuning of simple processes. In this new series, consideration will be given to dealing practically with more difficult issues like interactive processes, and with processes with much more complex dynamics.
Read more...Siemens sets new standards in drive technology
Fieldbus & Industrial Networking
Siemens is setting new standards in industrial drive technology with the launch of its new high-performance drive system, Sinamics S220. This offers a seamless and innovative drive system with comprehensive simulation and analysis capabilities and advanced connectivity features that enable full integration into digital work processes.
Read more...PC-based control in the plastics industry Beckhoff Automation
Fieldbus & Industrial Networking
Nissei Plastic, an injection moulding machine manufacturer based in Japan is implementing a worldwide tend towards open automation systems from experienced specialists using PC and EtherCAT-based control technology from Beckhoff.
Read more...Loop Signature 31: Non-linearity in control loops (Part 2) Michael Brown Control Engineering
Fieldbus & Industrial Networking
This article is a continuation of Loop Signature 30 published in the last issue in this series, exploring reasons for non-linearities which may be encountered in feedback control loops
Read more...PC-based control for flat wire motors for electric vehicles Beckhoff Automation
Fieldbus & Industrial Networking
Special machine manufacturer, ruhlamat Huarui Automation Technologies unveiled the second generation of its mass production line for flexible stators with bar winding. This enables extremely short production cycle and line changeover times, supported by PC- and EtherCAT-based control technology from Beckhoff.
Read more...PC-based control technology in additive manufacturing Beckhoff Automation
Editor's Choice Fieldbus & Industrial Networking
As an open control platform, PC-based control supports different engineering approaches, including low-code programming. The machine builder, Additive Industries uses this to create the code for the TwinCAT runtime of its 3D printers.
Read more...Integrating fire alarm systems into building management systems Beckhoff Automation
Fieldbus & Industrial Networking
Fire alarm systems work independently of the building automation system. Schrack Seconet has developed a flexible gateway using ultra-compact industrial PCs and TwinCAT from Beckhoff, which can be used to flexibly convert a customer-specific communication protocol to a wide range of transmission standards.
While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.