Best Practices for Securing AVEVA Work Tasks
- Last UpdatedJun 06, 2024
- 5 minute read
Introduction
Security is a core functional requirement that protects critical information from accidental or deliberate theft, leakage, integrity compromise, and deletion.
This document provides the best practices, which will help you define your security practices, and set of security policies and processes for your organization. This will ensure that the data and assets are protected while using AVEVA Work Tasks.
-
Securing Application Websites
-
Securing Data
-
Securing Ports
-
Securing using Users and Roles
-
Securing Application Configuration
-
Securing Webservers
-
Managing List Data
Securing Application Websites
Use of https
Central Configuration and Enterprise Console of AVEVA Work Tasks are web-based applications.
-
Central Configuration is meant only for administration purposes. However, it can be accessed by any user, if it is not protected. Therefore, Central Configuration needs to be protected by securing the sites.
-
Enterprise Console is meant to be used by various users. However, it can also be accessed through internet. Therefore, Enterprise Console needs to be protected.
-
Recommend use of Standard SSL certificate instead of self-signed SSL certificate.
-
AVEVA Work Tasks supports TLS 1.2 version.
Securing Sessions
-
Use Auto log off to secure sessions.
Ways to Minimize Security Threats
-
Ensure to use ‘https’ to host Enterprise Console.
-
Ensure to use SSL certificates.
-
Ensure to encrypt AppSettings in the web.config file for Central Configuration and Enterprise Console.
Note: If you want to edit the values in the web.config file, run the Command Prompt as an Administrator and type C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319.
For example,
To decrypt the value, type
aspnet_regiis -pd "<place holder for section name>" -app "/<place holder for application name>" -site <place holder for site number>
To encrypt the value, type,
aspnet_regiis -pe "<place holder for section name>" -app "/<place holder for application name>" -site <place holder for site number> -prov "DpapiProtectedConfigurationProvider"
where,
<place holder for section name> is section of the web.config file to be encrypted or decrypted
<place holder for application name> is application name (e.g. CentralConfig, EnterpriseConsole)
<place holder for site number> is site number to which AVEVA Work Tasks is bound to (e.g. site number is 2 for Enterprise Console)
For more information, refer Protected Configuration Provider.
Securing Data
Eliminating Database Security Threats
AVEVA Work Tasks is a highly database dependent application. The back end database is SQL Server.
-
Ensure to protect the database with proper security measures.
-
Keep periodic backups for any eventuality.
Ways to Minimize Security Threats on Database
-
Protect the database server with limited access.
-
Ensure to limit the database access rights only to the authorized users.
-
Provide only required rights to the maintenance team.
Securing Ports
Eliminating Threat on Ports
AVEVA Work Tasks application depends on certain ports for communication. System uses TCP / UDP for communication. Packets of data move from or towards these ports.
Hackers are constantly trying to discover new ways to connect to machines so that they can install backdoors for later re-entry, trojans to collect financial details, or botnet clients.
There are different kinds of threats such as denial of service, men in the middle attack, and so on. The entry point for each of these attacks is a port.
Therefore, protecting these ports without affecting the functionality is the responsibility of the user.
Ways to Minimize Threat on Ports
-
There are multiple ways to minimize threats on ports. These details are not in the scope of this document. It is recommended to refer to the industry standard mechanisms to minimize the threats on ports.
Note: For more information about the ports used by the system, refer the ‘Setting up Ports’ section in the Administrator Guide.
Securing Access using Users and Roles
Eliminating Unauthorized Access
AVEVA Work Tasks provides authorization to secure data on every level. You can protect data with proper authorization.
Forms customization through scripting can introduce security vulnerabilities if the End-Users who author those scripts are unfamiliar with Secure Coding principles or are acting maliciously. Forms Designer permission role should only be assigned to users who are trusted not to abuse the system and are familiar with secure coding principles.
Ways to Secure Access
-
Provide only accurate access to different users based on their usage.
-
Provide role-based access to features.
Note: For Security-related information, refer the 'Security Framework' section in the User Guide .
Securing Application Configuration
Eliminating Threats on Application Configuration
Farm Configuration is the base configuration for AVEVA Work Tasks. Ensure that the system and the access to configuration are protected, by providing access to the Farm Configuration only to Administrators.
Ways to Protect Farm
-
Ensure that the system can be access only by authorized users with Administrative privileges.
Ways to Protect Enterprise Console
-
Ensure use of Active Directory provider or AIM configured with appropriate policy instead of AVEVA Work Tasks Repository provider.
Securing Webservers
To improve the AVEVA Work Tasks WebServers security, disable the weak ciphers and protocols .
You can use the tool IIS Crypto for enabling/disabling the protocols and weak ciphers. You need to restart the webserver after making the changes.
It is recommended to enable the following protocol and ciphers:
-
Protocol - TLS 1.2 for server and client
-
Ciphers - AES 128, AES 256
Note: Assess the system for any impact on the other running applications before you enable/disable the protocols and ciphers.
Managing List Data
Eliminating threats on List Data
AVEVA Work Tasks provides List infrastructure to store data. Sensitive data can also be stored in the Lists. However, protecting this sensitive data is the responsibility of the organization and is important based on the business scenario.
-
Ensure to protect sensitive and confidential information using adequate measures.
Ways to protect sensitive information
-
Ensure to use password characters to show sensitive information.
-
Enable audit trail to track repudiation.
Enhancing Security for Service Bus of Notification Bus
You can enable enhanced security for Azure Connections to enforce additional security at the service bus level.
For more information about enabling enhanced security, see Enabling Enhanced Security.
Conclusion
Ensure that the organization takes adequate measures to:
-
Protect against information loss or leakage.
-
Secure data, resources, and application.
Key Points
Ensure the following:
-
Use https to host enterprise console.
-
Protect the database with proper security measures.
-
Provide role-based access to features.
-
Protect the ports.
-
Protect the system where services are running.
Enhancing Security of AVEVA Work Tasks Client Service running as Local System
AVEVA Work Tasks Client Service runs as a Local System and has higher privileges. It is used for:
-
Quickflow configuration and deployment
-
Service monitoring
-
Package installation
To secure and run Client Service with the least privileges, you need to elevate the permissions through security settings for the Client Service.
To elevate the Client Service to run on Network Service,
-
Run the below command in the Command Prompt:
netsh http add urlacl url=http://machinename:8863/ user="NT AUTHORITY\NETWORK SERVICE"
-
Restart the Client Service.
Note: You cannot configure and deploy Quickflow, perform Service Monitoring (or start other services), import and install the package if the Client Service is running as Network Service.
Improper Access Control List (ACL) in Custom Installation
In case AVEVA Work Tasks is installed in a custom path, the installation folder will inherit the access control restrictions of Program Files folder.
As a best practice to maintain security,
-
Use the default path for installation
-
Set ACL in case custom path is used for installation