Checklist for hardening OPC security
- Last UpdatedNov 15, 2022
- 1 minute read
- PI System
- DCOM Security and Configuration
- Interfaces
For a comprehensive discussion of OPC security hardening, see the Office of Electricity Delivery and Energy Reliability article http://energy.gov/oe/downloads/opc-security-whitepaper-3hardening-guidelines-opc-hosts.
General guidelines for maximizing OPC security include:
-
Disable all unnecessary services, including OPCEnum, which is not required for normal OPC interface operation.
-
Disable file and printer sharing
-
If the OPC interface and server run on the same computer, disable DCOM and remote registry access.
-
User accounts:
-
Define a low-privilege OPC users group and add only users who need OPC access
-
Define a high-privilege OPC administrators group limited to specific computers
-
Disable Guest access
-
Require robust passwords
-
Configure firewall to limit traffic to trusted computers and create a policy based on this configuration
-
Protect the Windows registry (no administrative rights for regular users, disable remote registry editing)
-
-
DCOM configuration:
-
Set the minimum authentication level to Packet integrity (verify that the overhead incurred does not interfere with the performance of the interface)
-
Security
-
Launch
OPC administrator account only if the OPC server runs as a Windows service.
-
Access
OPC administrator and OPC user accounts
-
Configuration
OPC administrator: full control.
OPC Users: read-only
-
-
Identity: Member of opcuser group
-
DCOM transport protocols: restrict to TCP
-