industrial internet consortium - forging trustworthy iiot systems … · 2020-02-26 · © 2018 opc...

34
© 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager, Matrikon (Honeywell)

Upload: others

Post on 18-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Thomas BurkePresident, OPC Foundation

Darek KominekMarketing Manager, Matrikon (Honeywell)

Page 2: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

The mission of the OPC Foundation is to manage a global organization in which users, vendors and consortia collaborate to create data transfer standards for multi-vendor, multi-platform, secure and reliable interoperability in industrial automation.

Page 3: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Data connectivity alone not enough to realize full IIoT potential.

Agent A

Agent A

Cloud A

Agent A

AgentAgent

Agent

Agent

Agent A

Agent

PC MQTT/ AMQP/…

Agent B

Agent B

Cloud B

Agent B

Agent B

No Interoperability!

No Interoperability!

Page 4: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

microchip

Desktop PC

iPhone

PLC/Controller

Laptop

Enterprise Servers

Tablet

Win CE

Page 5: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

OPC UA

Page 6: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

International board – democratic elections by members every year◦ Companies from Automation & IT◦ All over the world

Europe

JapanNorth America

Page 7: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

OPC FoundationScottsdale, Arizona

OPC EuropeGermany

OPC JapanMusashino-shi, Tokyo

An International Organization◦ Companies from Automation & IT◦ International standard IEC62541

OPC ChinaBeijing

OPC India 2018

OPC Korea 2017

Page 8: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Page 9: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation9

Oil & Gas

Utilities

Pharmaceutical

Manufacturing

Building Automation

Mining

Page 10: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation10

“The only communication technology for industrial environments that I currently know of which provides integrated security functionality and also offers performance potential to tackle the challenges of Industrie4.0 is OPC UA.”

Holger JunkerHead of Cyber-Security in Critical IT-SystemsGerman Office for Information

Made in China 2025Internet +

Page 11: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation11

Page 12: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation12

Sub-net

Cloud

OPC UA

OPC UA

OPC UA

OPC UA

OPC UA OPC UA

Page 13: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation13

Few standards meet the core connectivity standard criteria set out in IIRA◦ OPC UA is a core connectivity standard (IIRA)

◦ OPC UA is the main connectivity standard for I4.0 (RAMI)

• IIoT systems affect all aspects of a business so must be considered from multiple viewpoints (example from IIRA):

• Business Value & ROI• Cost of MaintenanceBusiness• New device registration in plant and cloud system• How information is accessed, users addedUsage• Component Interoperability in and across five functional domains:

• Control, Operations, Information, Applications, and BusinessFunctional• Architecture, component distribution, topology• interfaces, protocols, behaviors, etc.Implementation

Page 14: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation14

Frameworks offer a structured, systematic way to discuss and evaluate solutions for IT and OT convergence.

Industrial Internet Reference Architecture(IIRA)

Reference Architecture Model Industrie 4.0(RAMI)

• Seamless, reliable, and cost effective system interoperability is crucial to IIoT

Page 15: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation15

Source: Industrial Internet Consortium (www.iiconsortium.com)

Page 16: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation16

CRITERIA EXAMPLES:

Syntactic Interoperability Secure Performant Scalable Reliable Resilient Open Standard International Adoption Vendor Agnostic SDKs Available(Open Source + Commercial)

• Number of Core Data Standards kept as small as possible to minimize complexity

Source: Industrial Internet Consortium (www.iiconsortium.com)

Page 17: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation17

Key Concepts

Page 18: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Industrial Control System (ICS) Cyber attacks are accelerating

18

Reuters

Crash Override - Ukraine, 2016Stuxnet - Iran, 2010

Page 19: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

IT World OT World

IIoT World(Industrie4.0)

Safety | Security | Resilience | Reliability | Privacy

Page 20: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation20

Data Security

20

Data at Rest Data in Process Data in Motion

Page 21: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Trusted Information (CIA triad)

◦ Confidentiality◦ Integrity◦ Availability

Access Control (AAA principle)

◦ Authentication◦ Authorization◦ Accounting (Auditability)

Information Security

Availability

Page 22: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation22

Secure by Design

Page 23: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

1)Concepts2)Security Model

3)Address Space Model4)Services

5)Information Model6)Mappings

7)Profiles

8) Data Access9) Alarms and Conditions10) Programs11) Historical Access12) Discovery

13) Aggregates14) PubSub

Red: directly relevant for IT security

Page 24: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

OPC UA addresses the core security aspects:

Client-Server Architecture Publish-Subscribe Architecture

Page 25: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Layered conceptual communication model

Application Layer

Communication Layer

Transport Layer

Application Layer

Communication Layer

Transport Layer

OPC UA Client OPC UA Server

Execute UA Functions

Protect message

Transfer message

Software AuthenticationUser AuthenticationUser Authorization

App AuthenticationEncryption, Signing

TCP, HTTPSBinary, XMLEncoding/Decoding

Allow to choose appropriate abilities to meet various requirements– Level 3 Apps : Internet accessibility and Security (e.g. HTTP & XML, E & S )– Level 2 Apps : High speed and Security (e.g. UA TCP & BIN, S )– Level 1 Apps : High speed and Small-footprint (e.g. UA TCP & BIN)

Page 26: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Confidentiality Encrypting of Messages

Integrity Signing of Messages

Examples: • Restricting message size• No security related error codes returned

Availability Minimal message processing before authentication

Page 27: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Authentication of applications◦ Application instance certificates◦ Certificate Authority (CA)

27

Authentication of users◦ Username / password, WS-Security Token or X.509 certificates,◦ Fits into existing infrastructures like Active Directory

Auditability◦ Generating audit events for security related operations

Authorization (Server Specific)◦ Fine-granular information in address space (Read, Write, Browse)◦ Writing of meta data, calling methods

Page 28: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation28

Assessment & Evolution

Page 29: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Message Flooding◦ Minimize processing of packets before they are authenticated

Eavesdropping – record and capture packets◦ Encryption

Message Spoofing – attacker forges messages from client/server◦ Message signing, valid Session ID, Channel ID, timestamp, …

Message Alteration & Replay – messages captured, modified, resent◦ Session IDs, Secure Channel ID, Timestamps, Sequence# and Request IDs

Malformed Messages◦ Validating message structure and valid parameter values or discard

Server Profiling, Session Hijacking, etc…

Page 30: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC FoundationThreats and Impact on Security Objectives

Authentication Authorization Confidentiality Integrity Auditability Availability

Message Flooding XEavesdropping XMessage Spoofing X XMessage Alteration X XMessage Replay XMalformed Messages

X

Server Profiling X X X X X XSession Hijacking X X XRogue Server X X X X XCompromising User Credentials

X X

Page 31: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation31

Source: BSI, “OPCUA Security Analysis” (02/03/2017)

Page 32: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

PubSub◦ JSON Web Token (JWT)

Roles & Claim Based security Security Management Session-less Service calls

32

Page 33: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

OPC UA is secure-by-design: Implements CIA

Confidentiality and Integrity by signing and encrypting messages Availability by minimum processing before authentication

Implements AAA Authentication and Authorization of Users and Application instances Auditability by defined audit events for OPC UA operations

Facilitates use of different levels of security to match application/hardware OPC UA continually evolving to meet new threats and capabilities

Use of OPC UA security enhances overall system security (defense in depth)

Page 34: Industrial Internet Consortium - Forging Trustworthy IIoT Systems … · 2020-02-26 · © 2018 OPC Foundation Thomas Burke President, OPC Foundation Darek Kominek Marketing Manager,

© 2018 OPC Foundation

Darek Kominek, P.Eng. (Alberta, Canada)[email protected]

Thomas [email protected] Foundation