SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
PROFIBUS & PROFINET International (PI)
Peter Brown, CSA Group
PROFINET Security Concept
Safety over OPC UA
PROFIBUS & PROFINET International (PI)
PROFINET Security today
Use of Defense-in-Depth Concept:
Network segmentation und network
access control via security modules
Physical access protection for complete
network / security zone
Communication robustness tests for
PROFINET components
© 2019
Security
Module
Controller
Drive
I/O Module
Separated
network segment
Supervisor
PROFIBUS & PROFINET International (PI)
PROFINET Security – under consideration
Planned Approach
Extension of security measures
according to the „Defense in Depth“
concept
Integrated security in PROFINET
components
End-to-End security for PROFINET
communication as configuration option
Security
Module
Controller
Drive
I/O Module
Supervisor
Secured PROFINET Communication
Operator specific key material
© 2019
PROFIBUS & PROFINET International (PI)
Protection goals Relevance for
PROFINET
Details
Integrity High
Message packets must not be falsified as this could e.g. lead to unintentional
activation of actuators or the recording of incorrect measured values
Authenticity High
Messages packets must be uniquely assignable to its source. The components
must “identify” themselves and have a counterfeit-proof digital identify
Authorization High Only authorized components / users may have access to the automation system
Availability High
Depending on the production process, there are generally high to very high
availability requirements.
Confidentiality Low
The confidentiality of IO data is estimated as low as long as no conclusions can be
drawn with regard to company secrets (e.g., recipes)
Non-repudiation Medium When an event occurs, the initiating person/device should be identifiable.
Refers to installations where traceability of user intervention is required
© 2019
Security Objectives / Security Measures
PROFIBUS & PROFINET International (PI)
PROFINET Security Requirements
© 2019
Category Details
Secured End-to-End-
Communication
Secured End-to-End-Communication between Controller and associated Devices as well
as optional integration of Supervisor- / Diagnostic systems
Configuration option
Security extension is a configuration option for machines with higher security
requirements (different security profiles)
Parallel Operation
Parallel operation of secured and unsecured connections in one IO-System and also with
existing network infrastructure (e.g. switches) must be possible
Transparency for PN-
Functions / -Profiles
Support and protection for existing PROFINET Profiles / functions as transparent as
possible (for example PROFIsafe)
Performance
Integrity and authenticity checks must not have any qualitative impact to the PROFINET
performance characteristics
Note: Creation / check of security information in protocol extension in general leads to
increased component resources
PROFIBUS & PROFINET International (PI)
PROFINET Security Requirements
© 2019
Category Details
Crypto Algorithms &
Protocols
Security concept based on well-known and commonly accepted cryptographic algorithms
and protocols
Operator specific keys
Protection based on machine / plant specific key material
→ Individual for each PROFINET component
LifeCycle Management
for crypto functions
Support of a flexible LifeCycle Management for security functions
→ Preparation for the case, when cryptographic algorithms once must be assumed as
unsecure or vulnerabilities in the concept will be detected
Crypto Hardware Support of optional cryptographic hardware accelerator and / or key store
Manufacurer
certificates
Support of optional device identifiers integrated by device manufactures
(Manufacturer certificates)
PROFIBUS & PROFINET International (PI)
Secure communication establishment in 2 phases
© 2019
Asymmetric
key pair
Phase 1
Authentication +
Key exchange
Phase 2
Device Configuration +
Communication
……
IO Controller
IO Supervisor IO Device
Asymmetric
methods
Symmetric
methods
IO Sup.
Symmetric
key
PROFIBUS & PROFINET International (PI)
Phase 1: Authentication
Exchange of Operator Certificates
Exchange of public keys
Check of certificates
Establish a secure connection
IO DeviceIO Controller /
IO Supervisor
IO Sup.
Asymmetric
key pair
Asymmetric
key pair
Relatively slow method
Only for connection establishment
© 2019
PROFIBUS & PROFINET International (PI)
Phase 2: Secured Communication
Protection of subsequent real-time
communication
Usage of a symmetric method
Shared key per AR
Negotiated via key exchange mechanism
Usage of Message Authentication Code
mechanism → Protection of Integrity
Optionally usage of data encryption
→ Protection of confidentiality
Protection of real-time as well as non-real-
time communication
Secured Communication
IO Device
IO Controller /
IO Supervisor
IO Sup.
© 2019
PROFIBUS & PROFINET International (PI)
PROFINET Security Classes
Class Class Name Definition Area of application
1 Robustness Network robustness according to NetLoad
specification and additionally :
•
•
•
Changeable SNMP community name
DCP Read-Only mode
Integrity protection for GSD files
System is separated into zones and has
limited external communication;
** Introduction of class in Discussion **
2 Integrity +
Authenticity
Additionally to class1):
Integrity and authenticity• of
communication relations between
IOC / Supervisor and IOD
Confidentiality of configuration data
communication
•
System can not or not easily be
separated into zones; Access can not be
secured (e.g. outdoor installations).
Application places no requirements with
respect to confidentiality of IO data.
3 Confidentiality Additionally to class2):
• Confidentiality of IO data
communication
System like 2),in which information about
company secretscan be obtained from the
IO data of the system
© 2019
PROFIBUS & PROFINET International (PI)
More information in PROFINET Security Whitepaper
- available on PI Website
Summary
In future more consistent communication
across network zones will become the norm
– this will increase security risks.
Integrated Security Extensions for PROFINET
will enhance the existing cell protection concept.
Security Extensions will future proof
PROFINET communication.
© 2019
PROFIBUS & PROFINET International (PI)
Plant-wide functional safety
Controller A Controller B Controller C
Feldebene
Safety
over
OPC UA
Safety
over
OPC UA
PROFIsafe Safety-Profile XXX PROFIsafe
© 2019
PROFIBUS & PROFINET International (PI)
Network Layers
OPC UA Stack
Safety over
OPC UA
Safety-Application
“Black Channel”:
Changes do not require a
Re-Certification
Certified according:
IEC 61508
IEC 61784-3
…
OPC UA - Mapper
Scope of
“Safety over
OPC UA”
e.g. OPC RMI
Industry Specific Interface
(Companion Specification)
OPC UA Stack
Safety over
OPC UA
Safety-Application
OPC UA - Mapper
Industry Specific Interface
(Companion Specification)
Safety PDU
Application PDU
Protocol Data
Unit
Remote Method
Invocation
© 2019
PROFIBUS & PROFINET International (PI)
Key features of “Safety over OPC UA”
uses either OPC UA client/server or OPC UA pub/sub (with or without TSN)
unidirectional, bidirectional, and multicast communication patterns
arbitrary network-topology: line, tree, star, ring, mesh, …
arbitrary structured user data, length: 1-1500 bytes
dynamic establishment of safe connections during runtime
no requirements on regular (i.e. non-safe) network participants
no need for synchronized clocks
unlimited number of network components and terminals
unlimited data rate
© 2019
PROFIBUS & PROFINET International (PI)
Safety case
Based on IEC61784-3-3 (“PROFIsafe”)
Fault model follows IEC61784-3 (functional safety for fieldbus)
Cyclic watchdog (local clock of the consumer suffices)
32-Bit CRC-polynomial:
“Properness” shown for all data length between 1-1500 bytes
calculated PFH-value suffices for SIL4
IDs are used to detected authenticity errors such as misdirected telegrams
A Monitoring Number (MNR) is used to detected timeliness errors
The arguments are essentially identical to the arguments for PROFIsafe V2.6
© 2019
PROFIBUS & PROFINET International (PI)
Connection Types
Unidirectional connection
Bidirectional connection
Multicast
Controller A Controller B
Safety-
App
Provider
Safety-
App
Consumer
Controller A Controller B
Safety-
App
Provider Safety-
App
Consumer
Consumer Provider
Controller A
Safety-
App
Provider 1
Provider 2
Provider N
Controller
B1
Safety-AppConsumer
Controller
B2
Safety-AppConsumer
Controller
BN
Safety-AppConsumer
…
…
© 2019
Thank you.
Peter Brown
Technical Oversight Specialist
Unit 6 Hawarden Industrial Estate, Hawarden
CH5 3US, United Kingdom
+44 7501 494545
peter.brown@csagroup.org

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

IO-Link for the last metres communication - Derek Lane
IO-Link for the last metres communication - Derek LaneIO-Link for the last metres communication - Derek Lane
IO-Link for the last metres communication - Derek Lane
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
Profibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy SmithProfibus DP/PA network design - Andy Smith
Profibus DP/PA network design - Andy Smith
 
Profibus and Profinet device configuration - Phil Waterworth
Profibus and Profinet device configuration - Phil WaterworthProfibus and Profinet device configuration - Phil Waterworth
Profibus and Profinet device configuration - Phil Waterworth
 
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
 
PROFINET implementation and testing - Dave Tomlin, Hitex and Andy Morse, AJM
PROFINET implementation and testing - Dave Tomlin, Hitex and Andy Morse, AJMPROFINET implementation and testing - Dave Tomlin, Hitex and Andy Morse, AJM
PROFINET implementation and testing - Dave Tomlin, Hitex and Andy Morse, AJM
 
PI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training CoursesPI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training Courses
 
Process automation networks with PROFIBUS and PROFINET - Karsten Schneider, ...
Process automation networks with PROFIBUS and PROFINET  - Karsten Schneider, ...Process automation networks with PROFIBUS and PROFINET  - Karsten Schneider, ...
Process automation networks with PROFIBUS and PROFINET - Karsten Schneider, ...
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
Industry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter BrownIndustry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter Brown
 
Profinet in process automation - Peter Brown
Profinet in process automation - Peter BrownProfinet in process automation - Peter Brown
Profinet in process automation - Peter Brown
 
10 Good Reasons to use PROFINET
10 Good Reasons to use PROFINET10 Good Reasons to use PROFINET
10 Good Reasons to use PROFINET
 
8. PROFINET network commissioning and testing - Peter Thomas
8. PROFINET network commissioning and testing - Peter Thomas8. PROFINET network commissioning and testing - Peter Thomas
8. PROFINET network commissioning and testing - Peter Thomas
 
PI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of ThingsPI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of Things
 
PROFIBUS and PROFINET device configuration - Phil Waterworth
PROFIBUS and PROFINET device configuration - Phil WaterworthPROFIBUS and PROFINET device configuration - Phil Waterworth
PROFIBUS and PROFINET device configuration - Phil Waterworth
 
Profibus system engineering and monitoring - Andy Verwer
Profibus system engineering and monitoring - Andy VerwerProfibus system engineering and monitoring - Andy Verwer
Profibus system engineering and monitoring - Andy Verwer
 
PI Technologies for Process Automation
PI Technologies for Process AutomationPI Technologies for Process Automation
PI Technologies for Process Automation
 
Industrial control cases with MATLAB code in PLCs, using PROFINET's "oversamp...
Industrial control cases with MATLAB code in PLCs, using PROFINET's "oversamp...Industrial control cases with MATLAB code in PLCs, using PROFINET's "oversamp...
Industrial control cases with MATLAB code in PLCs, using PROFINET's "oversamp...
 
5. PROFINET Network design - Peter Brown
5. PROFINET Network design - Peter Brown5. PROFINET Network design - Peter Brown
5. PROFINET Network design - Peter Brown
 

Ă„hnlich wie Profinet security and safety update - Peter Brown

169
169169

Ă„hnlich wie Profinet security and safety update - Peter Brown (20)

PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
 
W02 Profinet benefits workshop - Andy Williams, Siemens
W02   Profinet benefits workshop - Andy Williams, SiemensW02   Profinet benefits workshop - Andy Williams, Siemens
W02 Profinet benefits workshop - Andy Williams, Siemens
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety Networks
 
169
169169
169
 
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation FirewallFortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
FortiGate 1500D Series Delivers High-Performance Next-Generation Firewall
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
OPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC TunnellerOPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC Tunneller
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Feng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdfFeng_Gao_Presentation.pdf
Feng_Gao_Presentation.pdf
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 

Mehr von PROFIBUS and PROFINET InternationaI - PI UK

Mehr von PROFIBUS and PROFINET InternationaI - PI UK (12)

11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf
 
4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf
 
10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf
 
9. PA DIM presentation.pdf
9. PA DIM presentation.pdf9. PA DIM presentation.pdf
9. PA DIM presentation.pdf
 
3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf
 
2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf
 
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device ConfigurationPI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
 
Profinet of Things -Derek Lane
Profinet of Things -Derek LaneProfinet of Things -Derek Lane
Profinet of Things -Derek Lane
 

KĂĽrzlich hochgeladen

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

KĂĽrzlich hochgeladen (20)

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

Profinet security and safety update - Peter Brown

  • 1. PROFIBUS & PROFINET International (PI) Peter Brown, CSA Group PROFINET Security Concept Safety over OPC UA
  • 2. PROFIBUS & PROFINET International (PI) PROFINET Security today Use of Defense-in-Depth Concept: Network segmentation und network access control via security modules Physical access protection for complete network / security zone Communication robustness tests for PROFINET components © 2019 Security Module Controller Drive I/O Module Separated network segment Supervisor
  • 3. PROFIBUS & PROFINET International (PI) PROFINET Security – under consideration Planned Approach Extension of security measures according to the „Defense in Depth“ concept Integrated security in PROFINET components End-to-End security for PROFINET communication as configuration option Security Module Controller Drive I/O Module Supervisor Secured PROFINET Communication Operator specific key material © 2019
  • 4. PROFIBUS & PROFINET International (PI) Protection goals Relevance for PROFINET Details Integrity High Message packets must not be falsified as this could e.g. lead to unintentional activation of actuators or the recording of incorrect measured values Authenticity High Messages packets must be uniquely assignable to its source. The components must “identify” themselves and have a counterfeit-proof digital identify Authorization High Only authorized components / users may have access to the automation system Availability High Depending on the production process, there are generally high to very high availability requirements. Confidentiality Low The confidentiality of IO data is estimated as low as long as no conclusions can be drawn with regard to company secrets (e.g., recipes) Non-repudiation Medium When an event occurs, the initiating person/device should be identifiable. Refers to installations where traceability of user intervention is required © 2019 Security Objectives / Security Measures
  • 5. PROFIBUS & PROFINET International (PI) PROFINET Security Requirements © 2019 Category Details Secured End-to-End- Communication Secured End-to-End-Communication between Controller and associated Devices as well as optional integration of Supervisor- / Diagnostic systems Configuration option Security extension is a configuration option for machines with higher security requirements (different security profiles) Parallel Operation Parallel operation of secured and unsecured connections in one IO-System and also with existing network infrastructure (e.g. switches) must be possible Transparency for PN- Functions / -Profiles Support and protection for existing PROFINET Profiles / functions as transparent as possible (for example PROFIsafe) Performance Integrity and authenticity checks must not have any qualitative impact to the PROFINET performance characteristics Note: Creation / check of security information in protocol extension in general leads to increased component resources
  • 6. PROFIBUS & PROFINET International (PI) PROFINET Security Requirements © 2019 Category Details Crypto Algorithms & Protocols Security concept based on well-known and commonly accepted cryptographic algorithms and protocols Operator specific keys Protection based on machine / plant specific key material → Individual for each PROFINET component LifeCycle Management for crypto functions Support of a flexible LifeCycle Management for security functions → Preparation for the case, when cryptographic algorithms once must be assumed as unsecure or vulnerabilities in the concept will be detected Crypto Hardware Support of optional cryptographic hardware accelerator and / or key store Manufacurer certificates Support of optional device identifiers integrated by device manufactures (Manufacturer certificates)
  • 7. PROFIBUS & PROFINET International (PI) Secure communication establishment in 2 phases © 2019 Asymmetric key pair Phase 1 Authentication + Key exchange Phase 2 Device Configuration + Communication …… IO Controller IO Supervisor IO Device Asymmetric methods Symmetric methods IO Sup. Symmetric key
  • 8. PROFIBUS & PROFINET International (PI) Phase 1: Authentication Exchange of Operator Certificates Exchange of public keys Check of certificates Establish a secure connection IO DeviceIO Controller / IO Supervisor IO Sup. Asymmetric key pair Asymmetric key pair Relatively slow method Only for connection establishment © 2019
  • 9. PROFIBUS & PROFINET International (PI) Phase 2: Secured Communication Protection of subsequent real-time communication Usage of a symmetric method Shared key per AR Negotiated via key exchange mechanism Usage of Message Authentication Code mechanism → Protection of Integrity Optionally usage of data encryption → Protection of confidentiality Protection of real-time as well as non-real- time communication Secured Communication IO Device IO Controller / IO Supervisor IO Sup. © 2019
  • 10. PROFIBUS & PROFINET International (PI) PROFINET Security Classes Class Class Name Definition Area of application 1 Robustness Network robustness according to NetLoad specification and additionally : • • • Changeable SNMP community name DCP Read-Only mode Integrity protection for GSD files System is separated into zones and has limited external communication; ** Introduction of class in Discussion ** 2 Integrity + Authenticity Additionally to class1): Integrity and authenticity• of communication relations between IOC / Supervisor and IOD Confidentiality of configuration data communication • System can not or not easily be separated into zones; Access can not be secured (e.g. outdoor installations). Application places no requirements with respect to confidentiality of IO data. 3 Confidentiality Additionally to class2): • Confidentiality of IO data communication System like 2),in which information about company secretscan be obtained from the IO data of the system © 2019
  • 11. PROFIBUS & PROFINET International (PI) More information in PROFINET Security Whitepaper - available on PI Website Summary In future more consistent communication across network zones will become the norm – this will increase security risks. Integrated Security Extensions for PROFINET will enhance the existing cell protection concept. Security Extensions will future proof PROFINET communication. © 2019
  • 12. PROFIBUS & PROFINET International (PI) Plant-wide functional safety Controller A Controller B Controller C Feldebene Safety over OPC UA Safety over OPC UA PROFIsafe Safety-Profile XXX PROFIsafe © 2019
  • 13. PROFIBUS & PROFINET International (PI) Network Layers OPC UA Stack Safety over OPC UA Safety-Application “Black Channel”: Changes do not require a Re-Certification Certified according: IEC 61508 IEC 61784-3 … OPC UA - Mapper Scope of “Safety over OPC UA” e.g. OPC RMI Industry Specific Interface (Companion Specification) OPC UA Stack Safety over OPC UA Safety-Application OPC UA - Mapper Industry Specific Interface (Companion Specification) Safety PDU Application PDU Protocol Data Unit Remote Method Invocation © 2019
  • 14. PROFIBUS & PROFINET International (PI) Key features of “Safety over OPC UA” uses either OPC UA client/server or OPC UA pub/sub (with or without TSN) unidirectional, bidirectional, and multicast communication patterns arbitrary network-topology: line, tree, star, ring, mesh, … arbitrary structured user data, length: 1-1500 bytes dynamic establishment of safe connections during runtime no requirements on regular (i.e. non-safe) network participants no need for synchronized clocks unlimited number of network components and terminals unlimited data rate © 2019
  • 15. PROFIBUS & PROFINET International (PI) Safety case Based on IEC61784-3-3 (“PROFIsafe”) Fault model follows IEC61784-3 (functional safety for fieldbus) Cyclic watchdog (local clock of the consumer suffices) 32-Bit CRC-polynomial: “Properness” shown for all data length between 1-1500 bytes calculated PFH-value suffices for SIL4 IDs are used to detected authenticity errors such as misdirected telegrams A Monitoring Number (MNR) is used to detected timeliness errors The arguments are essentially identical to the arguments for PROFIsafe V2.6 © 2019
  • 16. PROFIBUS & PROFINET International (PI) Connection Types Unidirectional connection Bidirectional connection Multicast Controller A Controller B Safety- App Provider Safety- App Consumer Controller A Controller B Safety- App Provider Safety- App Consumer Consumer Provider Controller A Safety- App Provider 1 Provider 2 Provider N Controller B1 Safety-AppConsumer Controller B2 Safety-AppConsumer Controller BN Safety-AppConsumer … … © 2019
  • 17. Thank you. Peter Brown Technical Oversight Specialist Unit 6 Hawarden Industrial Estate, Hawarden CH5 3US, United Kingdom +44 7501 494545 peter.brown@csagroup.org