Protect the applications and content on the host
- Last UpdatedJul 19, 2024
- 3 minute read
To protect the applications and content on the host:
-
Enable Windows Firewall, and configure it to close all ports that are not used by the ICS software. For more information about port usage, see Manage network services and ports.
-
Disable Windows features like remote desktop and file sharing, and remove unnecessary programs like games and social media.
-
Restrict access to the files, databases, registry and other resources on the host.
-
Use Windows BitLocker to encrypt the hard drive of computers that are either mobile or not located in a secure facility. However, BitLocker may impact the performance of computers.
-
Consider using server-class storage (SANs) infrastructure to avoid storing sensitive data on mobile devices.
-
If your application stores data in SQL Server, Windows authentication can provide better application security than SQL Authentication. If you switch from Windows Authentication to SQL Authentication, a pop up dialog will appear recommending that you use Windows Authentication for this reason. If you choose to ignore this warning and proceed with SQL Authentication, select OK. A similar message will be logged in the OCMC (SMC) Log Viewer.
AVEVA leverages the security built into the Windows operating system to store and manage encryption keys. The encryption keys are stored in a local storage location called the encryption store. For more information about the Windows encryption store, refer to the Microsoft documentation, located at Certificate Stores (https://docs.microsoft.com/en-us/windows-hardware/drivers/install/certificate-stores).
Phases of Data Protection
Data exists in three different phases, and protection must be provided for each phase:
-
At rest
-
In transit
-
In use
Data at rest
Data at rest is data that is not currently being used or accessed, such as data stored on a hard drive, laptop, flash drive, RAID array, network attached storage (NAS), storage area network (SAN), or archived/stored in some other way. Data protection at rest aims to secure inactive data stored on any device or network. For protecting data at rest, you can simply encrypt sensitive files prior to storing them and/or choose to encrypt the storage drive itself. BitLocker Drive Encryption, which you can invoke via the Windows Control Panel, can be used to invoke whole-drive encryption.
In the context of SCADA and ICS systems, data at rest includes stored configuration data, historical data, backups, and other static data. The duration of storage, that is, long term or short term, does not impact this classification of data at rest. Protection for data at rest is applicable for as long as the data exists in this condition; it is not a fixed condition.
Proper authorization rights need to be set in place to ensure the data is not being viewed by unauthorised users. Other steps can also help, such as storing individual data elements in separate locations, such as a corporate-approved offline backup to decrease the likelihood of attackers gaining enough information to commit fraud or other crimes. Offline backups are the best mitigation against the threat of ransomware.
Data in transit
Data in transit, or data in motion, is data that is actively moving from one location to another.
In the context of SCADA and ICS systems, this encompasses deploying a project to a run-time node, transmitting process variables, VTQ data, and other data that is sent between nodes in a running, production system. This includes alerts and alarms.
Data protection in transit is the protection of this data while the data traveling, including the following examples:
-
From node to node within a network
-
From network to network
-
Accessed via internet
-
Transferred from a local storage device to a cloud storage device
Wherever data is moving, effective data protection measures for in-transit data are critical as data is often considered less secure while in motion. Best security practice is to ensure TLS 1.2 encryption is used for all communications using the HTTPS protocol.
Data in use
Data in use refers to data that is being processed or accessed either locally or remotely. This generally involves placing data into memory (RAM) for access and processing by applications and users, potentially multiple users across different computers, mobile devices, remote terminals or other device. Data in use is particularly vulnerable to attack. To protect data in use, encryption, user authentication, and identity management is highly recommended.
In the context of SCADA and ICS systems, data in use can apply to databases, such as those used actively by a historian or deployed to a run-time node. This needs to be safeguarded by a secure transfer channel.