Loading...

Whitepaper

Leveraging KEPServerEX and Kepware's New Security Policies Plug-In to Meet Your Security Requirements

Download Now

Leveraging KEPServerEX and Kepware's New Security Policies Plug-In to Meet Your Security Requirements

By Tony Paine

The ability to securely move information between software applications and hardware appliances is critical to any automated process. To make this possible, an interoperable communications platform must be layered into the control system. Today, both the designers and implementers of these systems are taking a “defense-in-depth” approach to securing critical infrastructure: they expect that each layer in the control system will provide the functionality and flexibility needed to meet security requirements.

An additional layer of security is essential for communications between software and hardware components. It ensures that critical information will not be deciphered by non-authorized applications for malicious use, like hijacking a system or stealing intellectual property. There is also a need to limit the scope of activities that each authorized user is allowed to do and/or access in the system. Systems must be able to provide the information necessary to each stakeholder so that they may perform their responsibilities; however, by appropriately limiting access to information that the stakeholders do not require, administrators can minimize unintentional mistakes that may cause downtime or impact safety …

Download Now