20.08.2013 Views

PI Server Security Best Practice Guide - OSIsoft

PI Server Security Best Practice Guide - OSIsoft

PI Server Security Best Practice Guide - OSIsoft

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

<strong>PI</strong> <strong>Server</strong> <strong>Security</strong><br />

<strong>Best</strong> <strong>Practice</strong> <strong>Guide</strong><br />

Bryan Owen<br />

Cyber <strong>Security</strong> Manager<br />

<strong>OSIsoft</strong>


Agenda<br />

<strong>Security</strong> Development Lifecycle Initiative<br />

Using <strong>PI</strong> to Protect Critical Infrastructure<br />

Hardening Advice for the <strong>PI</strong> System<br />

Tools: <strong>Security</strong> Configuration Wizard<br />

<strong>Security</strong> Work In Progress<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

2


What is the <strong>Security</strong> Development<br />

Lifecycle?<br />

“A Process for Developing Demonstrably More Secure Software”<br />

Project<br />

Inception<br />

<strong>Security</strong><br />

Kick­Off<br />

<strong>Security</strong> Training<br />

<strong>Security</strong><br />

Design<br />

<strong>Best</strong><br />

<strong>Practice</strong>s<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

Attack<br />

Surface<br />

Threat<br />

Modeling<br />

Use <strong>Security</strong><br />

Development<br />

Tools &<br />

<strong>Security</strong> <strong>Best</strong><br />

Dev & Test<br />

<strong>Practice</strong>s<br />

Create<br />

<strong>Security</strong><br />

Docs<br />

and Tools<br />

For Product<br />

Prepare<br />

<strong>Security</strong><br />

Response<br />

Plan<br />

<strong>Security</strong><br />

Push<br />

Pen<br />

Testing<br />

Final<br />

<strong>Security</strong><br />

Review<br />

Requirements Design Implementation Verification Release<br />

Microsoft Press <strong>Best</strong> <strong>Practice</strong> Series:<br />

“The <strong>Security</strong> Development Lifecycle” by Michael Howard and Steve Lipner<br />

<strong>Security</strong><br />

Servicing &<br />

Response<br />

Execution<br />

Support<br />

&<br />

Servicing<br />

3


The C.I.A. <strong>Security</strong> Model for <strong>PI</strong><br />

It’s really about Quality!<br />

Core Platform Aspect<br />

...not an after thought.<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

Confidentiality<br />

Availability<br />

Integrity<br />

4


Using <strong>PI</strong> for<br />

Critical Infrastructure Protection<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

<strong>PI</strong> Industrial Data Center<br />

DCS HMI PLC SCADA<br />

5


<strong>PI</strong> Industrial Data Center<br />

Defense in Depth<br />

Reduce Surface Area<br />

Network DMZ Concept<br />

ALL Terminations in DMZ<br />

Boundary <strong>Security</strong><br />

Allow <strong>PI</strong> Data from Control Network<br />

IT Monitoring and Notification<br />

Aligns with Industry Standards<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

Enterprise<br />

Domain<br />

Critical<br />

Infrastructure<br />

6


How to Protect <strong>PI</strong> ...Same Principles!<br />

Adopt Mid­Tier Secure Service Layer<br />

Authentication by Infrastructure Provider<br />

Minimize Connections to <strong>PI</strong> <strong>Server</strong><br />

Distribute <strong>PI</strong> Roles for Optimum <strong>Security</strong><br />

Interface and IT Monitoring per Zone<br />

Consider <strong>PI</strong> <strong>Server</strong> per Zone (Use HA Collective)<br />

User Services/Data Access<br />

Avoid IIS on <strong>PI</strong> <strong>Server</strong><br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

7


<strong>PI</strong> System <strong>Security</strong> Boundaries<br />

Smart Connector<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

Smart<br />

Clients<br />

<strong>PI</strong><br />

Archive<br />

Data<br />

Portal<br />

Access<br />

User<br />

Services<br />

Notification<br />

Services<br />

Data Source Subscribers<br />

8


<strong>PI</strong> <strong>Server</strong> <strong>Security</strong> <strong>Best</strong> <strong>Practice</strong>s<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

White Paper Update<br />

System Lifecycle Policies<br />

Recent <strong>Security</strong> Changes in <strong>PI</strong><br />

Trusted Connections<br />

Network Service Roles<br />

<strong>Security</strong> Hardened<br />

Configuration<br />

9


Infrastructure Lifecycle<br />

<strong>Server</strong> Platform Minimum <strong>Security</strong> Baseline<br />

Windows 2003 SP1 with Firewall Enabled<br />

Hardware NX Support<br />

PR1 <strong>Server</strong> 3.4.375.x<br />

Applications & Interfaces: SDK 1.3.5 / A<strong>PI</strong> 1.6<br />

<strong>Security</strong> for W2K / NT4 ?<br />

Move Direct Client Access to Mid­Tier Services<br />

External Firewall<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

10


Patch Management<br />

Windows Update<br />

<strong>PI</strong> Software Update Service<br />

Anti­Virus Signatures<br />

Potential Issue: Automatic Hot Patching<br />

High Availability Solution Recommended!<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

11


Quality of Service Monitoring<br />

Managed <strong>PI</strong> Subsystem<br />

<strong>PI</strong> <strong>Server</strong> Check Utility<br />

Windows Perfmon Templates<br />

<strong>PI</strong> <strong>Server</strong><br />

Exchange, IIS, SQL, …<br />

SNMP Agent Templates<br />

Network Devices<br />

Unix O/S Support<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

12


Recent <strong>Security</strong> Changes in <strong>PI</strong><br />

DB<strong>Security</strong> Roles<br />

<strong>PI</strong> Trust Attributes<br />

Host name<br />

Application name<br />

<strong>PI</strong> Module<br />

Permission Inheritance<br />

Interfaces<br />

New Buffer Subsystem<br />

Disconnected Startup<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

13


Use Case: Interface Trust<br />

Trust <strong>PI</strong> User is “Owner” of Points and Data<br />

Change owner of root module for interface configuration<br />

Set Trust Entries with at Least 2 Credentials<br />

a) Masked IP Address<br />

b) FQDN for Network Path<br />

c) Application Name<br />

Specific syntax rules for <strong>PI</strong>­A<strong>PI</strong> applications<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

14


<strong>PI</strong> Trusts for Windows Users<br />

To Trust or Not to Trust?<br />

Extra password challenge is desirable in some cases<br />

Special purpose domain, Network access control<br />

Use Windows “Run As” or <strong>PI</strong>­SDK “Connect As”<br />

Domain User Trust <strong>Guide</strong>lines<br />

Map user trusts to least privilege <strong>PI</strong> accounts<br />

Consider User + Application Name + Subnet<br />

Reserve “piadmin” trust for console use<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

15


<strong>PI</strong> Network Service Roles<br />

<strong>PI</strong> Network Manager<br />

Advanced Computing Engine 2.x (Web Services)<br />

AF 1.x and AF 2.x<br />

Analysis and Notification<br />

OPC HDA/DA <strong>Server</strong><br />

Process Template Monitor<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

16


<strong>Security</strong> Configuration Wizard<br />

Part of Windows 2003 SP1 and greater<br />

Register <strong>PI</strong> SCW Extension<br />

Set Roles and Optional Features<br />

Disable Unused Services<br />

Apply <strong>Best</strong> <strong>Practice</strong> <strong>Security</strong> Policy Templates<br />

Demo<br />

Verify Baseline MBSA<br />

Functional Testing<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

17


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

18


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

19


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

20


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

21


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

22


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

23


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

24


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

25


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

26


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

27


<strong>Security</strong> Configuration Wizard<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

28


Windows MBSA<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

29


<strong>Security</strong> Related Work In Progress<br />

SDL Baseline Engineering <strong>Practice</strong>s<br />

Require Latest Compiler and Built­In Defenses<br />

<strong>Security</strong> Scrub of Legacy Code and Documentation<br />

Threat Models and Countermeasures<br />

Least Required Privilege<br />

Product Highlights<br />

Windows Integrated <strong>Security</strong><br />

User Service / Access Layer<br />

<strong>PI</strong> Software Update Service<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

30


<strong>Security</strong> Summary<br />

It’s really all about Quality!<br />

Starts in Design and Secure Coding <strong>Practice</strong>s<br />

Secure Infrastructure and Deployment Architecture<br />

Good Advice and Configuration Tools<br />

Quality of Service Monitoring and Support<br />

Call to Action<br />

Get: <strong>PI</strong> <strong>Security</strong> <strong>Best</strong> <strong>Practice</strong>s Whitepaper<br />

Visit: Data Center Monitoring Demo Pod<br />

Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.<br />

31


Copyright © 2007 <strong>OSIsoft</strong>, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!