By
Donovan Tindill, BAIST-NM, CETCYBER SECURITY means the confidentiality, integrity, and availability of computers, applications, and digital-based assets. In most organizations, this is the responsibility of the corporate IT group. Unfortunately, whenever IT meets real-time control systems, trouble erupts. So when IT implements different Windows, domains and firewalls, the first casualty is typically DCOM communication and, consequently, OPC traffic. It is an accepted fact that Microsoft Windows is the most prevalent desktop operating system in the world today, in homes, businesses, and industrial facilities. Thus, Windows has become a popular target of malicious network attacks. This is echoed in the fact that hackers constantly develop new worms and viruses that attempt to penetrate every network. These malicious applications are so contagious that the introduction of an infected laptop to an otherwise uncontaminated network can bring an enterprise down to its knees in minutes. It is for this reason that IT departments are concerned with cyber security. Their objective is to protect the users as well as all the connected devices. Unfortunately, IT departments rarely understand the operational needs of the production side of the business, so communication and compatibility problems quickly surface. One of the first casualties is DCOM (Distributed Component Object Model). Microsoft developed DCOM to provide an easy-to-use communication infrastructure for remote Windows applications and computers to work together. DCOM enables developers to reuse Microsoft’s methods and procedures in their own applications. This accelerates application development and increases reliability. It is for this reason that the OPC Foundation selected DCOM as the basic building block for OPC communication. DCOM comes from the IT side of the world. It is easy for programmers to use, but this ease comes at a price. DCOM requires many ports for finding other hosts, resolving names, requesting services, authentication, sending data, and more. If these ports are not available, DCOM will automatically search for others. Of course, any port and service used by DCOM is a target to cyber attacks (viruses and worms). So when DCOM security is compromised, all applications are affected including OPC applications. The recent Blaster and Sasser viruses attacked the same components that OPC relies upon. Anyone using OPC may be vulnerable to both of these viruses and more in the future. Cyber security is necessary for process control networks if they intend to integrate with business networks. Again, due to the pervasive nature of Windows and DCOM, when the IT department locks down communication, many applications, including OPC applications are immediately and frequently terminally affected. The good news is that if plant and business systems are configured and maintained correctly, network security and OPC can coexist nicely.
ENTERPRISE NETWORK ARCHITECTURE |