Secure Implementation of Opc 1704663233
Secure Implementation of Opc 1704663233
Publisher
Federal Ministry for Economic
Affairs and Energy (BMWi)
Public Relations
11019 Berlin
www.bmwi.de
Text and editing
Plattform Industrie 4.0
Bertolt-Brecht-Platz 3
10117 Berlin
Design and production
PRpetuum GmbH, Munich
Status
April 2018
Printed by
MKL Druck GmbH & Co. KG, Ostbevern
Photos and illustrations
BlackJack3D – gettyimages (title), sdecoret – Fotolia (p. 6),
patpongstock – Fotolia (p. 8), zapp2photo – Fotolia (p. 9),
NicoElNino – Fotolia (p. 13), Gorodenkoff – Fotolia (p. 21),
Sikov – Fotolia (p. 23), kras99 – Fotolia (p. 24)
This and other publications are available from:
Federal Ministry for Economic Affairs and Energy
This brochure is published as part of the public relations work Public Relations
of the Federal Ministry for Economic Affairs and Energy. It is E-mail: [email protected]
distributed free of charge and is not intended for sale. The dis- www.bmwi.de
tribution of this brochure at campaign events or at information
stands run by political parties is prohibited. No political party- Central procurement service:
related information or advertising may be inserted in, printed Telephone: 030 182722721
on or affixed to this publication. Fax: 030 18102722721
2
Content
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Threat analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Application scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Taking possession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Commissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Decommissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Disposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Solution sketch/discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Security domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
List of illustrations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4
Introduction
The innovative concepts and procedures of the Fourth Consideration of security requirements
Industrial Revolution (Industry 4.0) are creating entirely
new possibilities for cooperation – especially on a technical Software and network communications are already being
level. Systems, machines and products interact, exchange extensively used today for tasks with increasingly more
data and information, communicating with each other all open security domains in automation. That’s why security2
the while. It makes no difference whether communication aspects must also be taken into account in order to meet
takes place with a machine in the same factory hall or with the resulting protection requirements. Although no new
a system in a plant on the other side of the world so that threats are generally expected, the now necessary opening
the boundaries for trust are exceeded. However, this can of perimeter protection, i.e. protection on the perimeter of
only work if technical communication mechanisms ensure the security domain, means a larger attack area. When it
that Industry 4.0 components (assets) can communicate in comes to critical infrastructures, operators are therefore
a secure and interoperable manner (1) and thereby enable now required to take security measures to ensure provi-
trust across company boundaries. sioning. In industrial automation, security awareness also
grows as network-based communication increases. With
the goal of smart production in Industry 4.0 and the associ-
The importance of OPC UA ated communication between IT, production, assets, com-
ponents and products, security is an elementary part of
OPC UA (OPC1 Unified Architecture) is an architecture used concepts, as is also described in the implementation strat-
to describe and exchange machine data. In this respect, egy (2).
OPC UA is more than just a communication protocol – the
architecture also includes data models and interaction con- Established standards and norms describe the technical
cepts. OPC has been successfully used in automation tech- and organisational measures that form the basis for secure
nology for some time now. The further development of use, see the section on “Security”. The requirements of
OPC UA is today widely supported; it has been recom- these standards and guidelines must be implemented in
mended as an important technology in the implementa- practice so that secure application of the OPC UA standard
tion strategy of the Industry 4.0 platform (2) and is part of is possible. The OPC UA standard offers many solution con-
the “Criteria for Industry 4.0 Products” of the ZVEI manu- cepts and ideas. What’s important now is to describe how
facturers’ association (3). This paper focuses accordingly the individual aspects have to interact in order to achieve
on OPC UA. the goal of secure use.
Work to standardise machine-to-machine communication The aim of this discussion paper is to highlight the require-
has been underway for several years and at times parallel at ments for the secure use of OPC UA for communication in
various organisations, such as the OPC Foundation, IETF, Industry 4.0 scenarios, to present implementation options
oneM2M, OASIS, NIST, ITU, to mention but a few. This has and to identify points for discussion. The integration of a
resulted in different architectures, protocols and security machine into an operator’s infrastructure over its lifecycle
concepts with different functionalities. will be used as an example.
1 OPC: Originally “OLE for Process Control”, today “Open Platform Communications”
2 Always short for IT security in this document
INTRODUCTION 5
The aim is to provide the stakeholders, manufacturers, This paper is based on the OPC UA standard, version 1.04,
integrators and operators involved with specific informa- which offers significant further developments, especially
tion about the necessary functions and measures and to for security. However, it can be assumed that the imple-
describe best practices. At the same time, the analysis mentations and development tools available on the market
should show the extent to which the implementation of are not yet at this level. One aim of this paper is to support
the security measures will lead to even more far-reaching providers and users during the transition.
requirements that call for additions to the OPC UA stand-
ard or to existing toolkits and products. The goal here is to This paper is meant for technically experienced readers,
cover as many aspects as possible with OPC UA only, so ideally with experience in the application of OPC UA.
that no further requirements have to be fulfilled, for
instance, by an additional interface such as web-based
management. Therefore, both configuration and parame-
terisation must have a uniform design across corporate
boundaries. This approach will improve consistency and
interoperability.
6
Security
SECURITY 7
Security is a holistic issue that can only be achieved when • Integrity: Ensuring the correctness (integrity) of data
all stakeholders work together. The relevant standards for and the correct functioning of systems
industrial automation, IEC 62443 (4) and the German VDI
2182 (5), therefore always consider interaction between • Availability: Services, functions, information can always
operators, integrators and manufacturers. be used as intended
Protection goals and guidelines In security management, it can be generally assumed that
100% security is simply not possible. In addition, mechanisms
Once the threats have been identified, the protection goals must be in place to detect attacks, such as event logging
are formulated accordingly and measures are taken based and communication inspections, along with emergency
on the severity of impact and the assumed probability. The and recovery concepts.
primary protection goals are:
Component and system security NAMUR recommendation NE 153 (9) concisely describes
the four aspects of component and system security:
Various parts of IEC 62443 (4) describe the requirements for
security functions, such as user management, integrity pro- • Security by Design: Security must be included in the
tection, secure storage of electronic keys and logging, as design stage
well as requirements for processes in the integration and
development of components. The security functions are • Security by Implementation: Security as a feature by
classified as “Security Levels”, from SL-1 to SL-4, which are avoiding errors as far as possible
designed to express the system’s strength of resistance. The
security level is also determined in the threat analysis. It is • Security by Default: A secure status should always be
important to bear in mind that security not only means the the basic setting, no retroactive hardening
existence of functions, but also requires the application of
development and integration processes that have been • Security in Deployment: Secure operations through
designed on the basis of security aspects. security documentation and product maintenance
9
Application scenario
10 A P P L I C AT I O N S C E N A R I O
The “Collaborative Factory” scenario is used to illustrate Figure 2 shows the logical communication relationships of
such an application. This Industry 4.0 scenario shows the the machine. On the one hand, the machine must be inte-
integration of different machines into a factory with con- grated into the production process and hence interact with
nections to cloud solutions and other external companies the operator’s systems. It must be possible to not only man-
(Figure 1). An overview of the application scenario can be age production orders but also to collect operating data and
found in the appendix. Communication within a compa- handle alarms. This communication relationship, marked
ny-wide network poses a multitude of demands for secure with a green arrow in Figure 2, is the focus of this discussion
design. These requirements and approaches are already paper.
discussed in the technical overview entitled “Sichere unter
nehmensübergreifende Kommunikation” (10). In an extended examination, interaction between the
machine and an external service provider must be taken
For the purposes of this document, only the integration into account, which is indicated by a red arrow in Figure 2.
of machine A into an operator’s infrastructure is to be This service provider could be the integrator or machine
examined, see box in Figure 1. The machine is seen as a designer himself, who would only access the machine for
unit that must interact with its environment. The machine remote maintenance purposes (“condition monitoring”)
design is irrelevant here. or, in the operator model, could even actively parameterise
the machine.
Enterprise
External Cloud
Internal Cloud
Internal Cloud
DMZ
Enterprise Operator 2
Internal Cloud
Machine A Maschine B
IoT - Gateway IoT - Gateway
Production order
Machine A Batch process
IoT-Gateway (recipe)
Alarms/events
OPC UA
Operating data
Local Switch Alarms/events
Updates
Parameterisation
No contractual
relationship between
component manufacturer
and operator
Therefore, the service
provider must be
responsible for
communication
This document, however, does not examine the special fea- Therefore, OPC UA is to be used in this paper to integrate a
tures that result from this, such as possible requirements new machine into the operator’s systems. The machine is
for monitoring of communications by the operator. Other integrated within a local network controlled by the operator.
options, such as individual communication between indi- This document focuses on this local integration which targets
vidual machine components and their manufacturers, are the operator’s security domain.
not examined either.
The logic connection to the external service provider is a
The discussion in this document refers to the logical com- remote connection. It is possible here that communication
munication relationships, i. e. information exchange. The may run physically through the operator’s network and then
underlying transmission technologies used (wired, wireless, via the Internet to the service provider. This enables efficient
short or long distance) were not considered. use of existing resources. This design also allows the opera-
tor to monitor and influence communication. A dedicated
connection via separate Internet connectivity is also con-
Application of OPC UA in the scenario ceivable, with would reduce interaction in the operator net-
work. In any case, communication is established between
It is widely expected that OPC UA will play a key role in the operator’s security domain and that of the service pro-
the connected industry, since the exchange of parameters, vider. That’s why the security measures of the stakeholders
operating data and alarms is one the main features of must be coordinated and taken into account in the respec-
OPC UA. tive security management system, see technical overview
12 A P P L I C AT I O N S C E N A R I O
The following section restricts itself to discussing the • Decommissioning of the system or system components
secure use of OPC UA. The quality of the implementation,
for example, through a secure development process • Disposal after final decommissioning
(Security Development Lifecycle, SDL) and other security
functions are not included here. In principle, the analysis is first generic, since the stakeholders’
specific protection goals are not known. All possible require-
ments must therefore be examined at the highest security
Lifecycle level in order to ensure that all the necessary protection
goals can be achieved. In addition, the requirement level is
In order to be able to analyse the stakeholders’ security looked at independent of the technologies used.
requirements for the machine to be integrated, the lifecycle
is examined, beginning with the provision of the necessary An analysis of the first part of the lifecycle, taking possession
components and ending with the decommissioning of the and integration of components into a system, can already
machine (see Figure 3). The phases explored here are: be found in the paper entitled “Security der Verwaltungs
schale” (11).
• Provision and ownership of a component
Integrator Operator
Start
Commissioning
Taking possession engineer
Commissioning
Integration
Hand over?
Yes
No
Decommissioning
Continue Yes
use?
Yes Return?
No
No
Disposal
Disposal
Stop
Stop
The security requirements for a component are examined First of all, it must be ensured that the component is an orig-
on the basis of the lifecycle phases described above in addi- inal component and that neither hardware nor software
tion to a section for contingency and restoration measures. (including firmware) have been manipulated. While the
authenticity of hardware can be verified on the basis of its
At the end of each phase, the security requirements identi- physical features, such as holograms, software and firmware
fied in the document are summarised and repeated in can be checked on the basis of code signatures.
abstract form.
In addition or alternatively, the authenticity of the compo-
A solution is subsequently sketched highlighting both the nents and their firmware can also be verified via the network.
requirements that can already be fulfilled with means This enables work processes in which different persons are
according to the OPC UA standard and/or sensibly using responsible for physical assembly and taking possession.
other customary measures as well as the areas where the Each component should have an individual certificate issued
need for discussion becomes apparent. by the manufacturer. By using the pertinent private key,
the device then confirms that its state is the state that has
During the discussion on the lifecycle, the need for identi- been defined as authentic by the manufacturer. There are
ties from different sources already becomes apparent. In two ways to verify whether this certificate is valid: 1.) If the
order for them to be kept apart, the sources are described certificate issued by the manufacturer is issued by a root
here first, i. e.: Certification Authority (root CA), the entire certificate chain
must be checked. 2.) If the certificate is individually self-
1. identities issued by the component manufacturer signed, the manufacturer must provide the certificate finger
(e. g. ZHN manufacturer certificates), print separately for comparison. This fingerprint must reach
the customer via a different channel than the component
2. identities assigned by the integrator itself, e.g. by publishing the fingerprint on the manufactur-
(e. g. ZIN certificates), er’s HTTPS secured website. Sending the fingerprint in the
instructions for the component or in test software on a CD
3. optional identities valid in the system included in the scope of delivery is not secure enough and
(e. g. ZAN certificates) and an attacker could change both (device and documentation/
test software) during delivery.
4. identities issued by the operator
(e. g. ZBN certificates). Hybrid forms of these two variants are conceivable for veri-
fying the certificate issued by the manufacturer. For exam-
ple, to save costs, the manufacturer himself can operate the
Taking possession root CA for the device certificates issued by him. In this case
and using a separate channel, the manufacturer only needs
Taking possession of a component is understood to be the to provide the fingerprint for the root certificate created by
first-time use by an integrator or directly by the operator. him. The fingerprint is then the same for many devices, for
The integrator takes a generic component and configures example, all the devices of a series or even all of the manu-
it to gain exclusive control over it. This is carried out, for facturer’s devices.
example, by replacing default passwords or uploading inte-
grator certificates. In abstract terms, these are the identity The private key that belongs to the public key of the certifi-
information and authentication criteria used by the com- cate must be kept locked. Ideally, this is carried out using
ponents to verify the identity of their communication part- secure hardware, a so-called “secure element”. All operations
ners. on the private key then take place in the secure environment
of the “secure element”.
First-time use of a component can refer to a brand new
component or to a component that has been reset to fac- To ensure that no manipulation has taken place here, the
tory settings (and is therefore equivalent to a brand new integrity of the “secure element” should be checked, if pos-
component in terms of its configuration). sible, when it is taken into possession. There are also proce-
dures for this that can be carried out via the network.
E X A M I N AT I O N O V E R T H E L I F E C YC L E 15
Even if there are reasons not to use a secure element, the Integration
use of asymmetric key pairs of public and private keys offers
added security. If a component does not even have the After possession has been taken of the individual compo-
resources to use asymmetric key pairs, other components nents, the integrator combines them to produce an overall
can be used as relays. In a small, relatively separate area, for function. The integrator establishes both a logical and a
instance, a relaying component can use asymmetric key physical relationship between the components and models
pairs and communicate on behalf of the other components the behaviour of the individual components required for
that have no key pairs. In this case, communication with the overall function. The processes in this step are especially
the other components beyond this point should be carried relevant for security, since both the relationships between
out via a medium with suitably restricted access. the individual components and the function of the individ-
ual components are decisive for the resultant secure and
An important part of a component’s security is its secure correct operation of the machine or system. In particular,
configuration. When a component is delivered, its default the following particularly security-critical processes can be
configuration should be parameterised as securely as possi- identified during the integration phase:
ble in order to prevent attacks during taking possession or
insecure subsequent configurations due to operating errors. a. Definition of the digital identities of the respective
This is also known as “Security by Default”. For OPC UA individual components.
communication, for example, the None security policy would
have to be excluded, i.e. it should not be offered. If the highest b. Modelling and implementation of the relationships
security level is not required for an application, the compo- between the component and other entities, such as
nent should ensure that the change in configuration is sub-
ject to authorisation which in turn requires a graded rights 1. other devices and software processes inside and
access control concept. It must also be possible to reset the outside the machine or system and
configuration of the component to (secure) factory settings.
2. persons acting in a certain function.
The security requirements for a component are therefore
as follows for taking possession of a component: c. Setting (parameterisation) of access control mechanisms
according to the model of relationships between the
1. It should be possible to verify the authenticity of the component and other entities.
component on the basis of a certificate from the man-
ufacturer. d. Control of access to internal device features and func-
tions with the aim of protecting business secrets which
2. It should also be possible to reset all component settings the integrator brings to the machine or system.
to the manufacturer’s factory settings.
When relationships are established between individual com-
3. The basic configuration should have a secure design and ponents and other entities, both the functions of the devices
the device should be delivered with a secure configura- and the resulting access rights of individual devices and
tion, making an attack during commissioning unlikely. software components must be defined in relation to each
other. Unambiguous and reliable component identification
4. The integrator should be able to define all of the authen- and referencing is an important basis for modelling com-
tication criteria used by the component to verify other ponent relationships. This can be based on secure digital
identities. These include all passwords and all certificates identities (e. g. digital certificates and hardware support).
that the component trusts, except for a few certificates A digital identity can be assigned to a component either
that are intended by the manufacturer for special pur- via a public key infrastructure (Certification Authority and
poses, such as authentication of firmware updates. issuance of certificates) or by manually configuring certifi-
cate-based identities on the respective components. It should
be noted that the identities are assigned either within the
system itself and/or by the integrator. If the identity of the
manufacturer were used to establish the relationship, this
16 E X A M I N AT I O N O V E R T H E L I F E C YC L E
might enable an attacker to later infiltrate the system by With more complex systems and machines where a large
replacing the device with a device purchased and parame- number of access rights must be configured similarly or
terised by the attacker that also has a valid manufacturer’s identically for other different components or persons, role-
certificate. based or attribute-based assignment of rights makes it easier
to manage these access rights. This means that rights can
Once the devices have been given a secure identity (ZIN be defined for a role (e.g. maintenance staff, operator, mon-
certificate including public/private key), trust relationships itoring, etc.) or for the owner of attributes (e. g. affiliation to
between these devices can be modelled. This is carried out the company and responsibility for maintenance). What’s
by including the identity of one device in the trust list of special here is the implementation of the rights specification
another device. Alternatively, the identity of a Certification without already defining the specific digital identity in the
Authority (CA), which can authenticate other digital identi- integration phase. Role affiliation or attributes must then
ties, can be included in a trust list of a component. In the be assigned to an identity using suitable measures during
latter case, all identities issued by the CA are trusted and operation (e.g. based on a central authentication system in
this reduces the configuration effort needed because the the operator’s environment). The integrator can then provide
certificates to be checked no longer have to be explicitly for certain interaction patterns which the operator later
included by other devices. Direct inclusion of identities in assigns to specific individual identities.
the corresponding trust lists or inclusion of a Certification
Authority determines the components which the integra- The security requirements for integration of a component
tor basically provides for interaction. Each component are therefore as follows:
should be configured to interact with a minimum number
of other components. This reduces the possibilities for an 1. It should be possible to assign an integrator-specific
attacker after a single component has been compromised. identity with a pertinent ZIN certificate to the
component.
After the permitted communication relationships have been
configured, the access rights of the respective components 2. For the purpose of communication in the system,
must be modelled further. The integrator will restrict access the component should:
to individual values of a component for other components
or other users in order to prevent attacks, misuse or disclo- 2.1 be given and be able to use a system-specific identity
sure of the integrator’s company secrets. Access to compo- including a ZAN certificate (which may be, but does
nent functions and data should be designed in such a way not need to be the integrator-specific identity) and
that each user (other component or user) only receives the
minimum level of access rights necessary to perform their 2.2 be given and be able to use a system-specific
function. The integrator sets these access rights and in many trust list.
cases will reserve the exclusive right for himself to adjust
access rights and restrictions and to assign access rights (to 3. For the purpose of communication with the integra-
a component or person). This is necessary because other- tor’s processes and staff, the component should be
wise the integrator cannot impose any restrictions to pro- given and able to use the integrator-specific identity,
tect the function of a machine or to protect his own com- including the ZIN certificate, as well as an integra-
pany secrets (e. g. the exact configuration of components tor-specific trust list.
and their interaction). The integrator can grant further rights
to the future operator, so that he can operate the machine 4. The component should support an access control
as intended or integrate it into his own company infra- mechanism that can be used to define rights indepen
structure. In this scenario, this means that the integrator dent of specific identities.
gives some of the operator’s users or components read
access to certain values and alarms, so that the machine 5. The rights in the component should be set so that
can be monitored. In addition, the operator can have write certain rights are required in order to change rights.
access to certain machine parameters, so that they can be
adapted to the products to be manufactured. 6. The rights in the component should be set so that cer-
tain rights are required to set the rules for assigning
rights to identities.
E X A M I N AT I O N O V E R T H E L I F E C YC L E 17
A transfer of risk takes place during commissioning. The Preparation for handover to the operator is carried out by
system created by the integrator moves from the integra- the integrator.
tor’s sphere of responsibility to that of the operator. Com-
missioning can be divided into two phases: In the first phase, For the example scenario, handover is prepared in the fol-
the integrator prepares the takeover by the operator. In the lowing steps and in the following order:
second phase, the operator takes over the system. This part
of the takeover by the operator is often also accompanied by • The integrator defines access rights for maintenance staff
the integrator’s staff. In this case, staff performing the take- and maintenance processes in the form of additional rights
over by, for or with the operator are referred to as “com- and assignment rules. Specific assignments of rights are
missioning engineers.” This happens irrespective of whether also activated, for example, by assigning sets of identities
these staff are now assigned to the operator, are contracted with concrete rules to roles. In some applications, it is
by the operator or whether they are the integrator’s staff necessary that these rights also include the right to update
accompanying the operator’s staff. The integrator prepares the system’s software and firmware at the beginning of
the commissioning of the system and takeover is carried commissioning. Delivery may have taken weeks, so that
out by the commissioning engineer. in the meantime updates may be available for software
and firmware. The resulting complexity of rights – and
It is not just the responsibility for the system that changes how their definition survives a software and firmware
after commissioning. This often also means a change in renewal – is not discussed further in this paper, but re
possession (in this scenario, however, with no change in mains a task for a successor paper.
ownership). This primarily changes the integration of the
system into the security domains. It ultimately determines • The integrator stores and activates authentication criteria
to a certain extent who or what can accesses the compo- and rights in the components of the system for the
nents and vice versa, and who or what the component can commissioning engineer, so that he is recognised by the
communicate with. Other parts of these rights determine system during takeover.
the access control mechanisms already set during integra-
tion along with options for assigning rights.
Integrator Operator
Commissioning Integrator
engineer Preparation
Commissioning
Commissioning
engineer
Takeover
• I n many cases, it must be possible for the system to ments and authentication criteria again for the com-
verify these authentication criteria without the need missioning engineer.
for functioning integration into an IT network, because
the system will not yet have been integrated into 3. The integrator should be able to delete unnecessary
such a network at its new location. access paths, authentication criteria and rights from
the system.
• urthermore, the work of the commissioning engi-
F
neer is once-off and temporary. This work is com-
pleted when the system has been taken over. The Takeover during commissioning
integrator rather than the commissioning engineer
is responsible for maintenance according to the While preparation for commissioning can take place before
model here. shipment of a system, actual takeover in this example will
take place after shipment and physical installation of the
This means that, according to the principle of assign- system on site.
ing need-to-know rights, the special rights assign-
ments for the commissioning engineer can be deac- The commissioning engineer’s task is to take over the system
tivated once the work has been completed. His from the integrator and to commission it at the operator’s
authentication criteria and rights assignments should site in such a manner that the operator can subsequently
therefore only exist temporarily in the system. operate the system for his benefit in regular operating mode
(only to be interrupted by maintenance, if any). For this
• Finally, the integrator removes unnecessary authentica- purpose, the commissioning engineer connects the system
tion criteria as well as access rights and options which to the local environment at the operator’s site. In addition
he no longer needs after handover. to physical connections, this also includes connection to the
operator’s IT, and more importantly, inclusion in certain
• If necessary, the integrator has granted the system and/ security domains:
or its components access possibilities and rights in the
integrator’s security domain which were necessary during • First of all, the commissioning engineer checks the authen-
component integration, for example, for a test operation. ticity and integrity of the system in order to determine
The integrator will therefore block or delete unnecessary whether the system is from the integrator and whether
access paths and rights for the system in his security do it is in the state in which it was prepared by the integra-
main. The integrator will not delete the identities and tor. This is particularly necessary if the system or parts
pertinent ZIN certificates issued by him, nor will he of the system were under the control of third parties in
revoke them, instead, their access options will be reduced. the time between preparation and takeover, for example,
These identities could be useful for remote maintenance. by a forwarder and its contractor.
Preparation for commissioning therefore results in the • If the system is trusted, the commissioning engineer brings
following security requirements for a system with Industry identities created by the operator together with ZBN cer-
4.0 components: tificates into the system to enable secure interaction
with the operator’s security domain.
1. It should be possible in the system to adjust the authen-
tication criteria, rights and rights assignments (to roles • The system and its components are incorporated in
or access rules) defined by the integrator for mainte- two stages into the security domain of the operator’s IT.
nance access.
• uthentication criteria provided by the operator are
A
2. The integrator should be able to activate authentica- incorporated into the system and its components.
tion criteria and rights in the system that are tempo-
rarily needed for the commissioning engineer, so that
the system can authenticate the commissioning engi-
neer, if required even without a network connection,
and it should be possible to remove these rights assign-
E X A M I N AT I O N O V E R T H E L I F E C YC L E 19
• The commissioning engineer tests remote maintenance 5. It should be possible to map the descriptions actually
access together with the operator and the maintenance used by the operator (external roles, external attributes
staff working remotely. In doing so, he also explains to and their characteristics) for the identities of his per-
the operator the access path and the rights that can be sonnel and his processes to designations defined by
exercised via this path. This does not mean that a perma- the integrator (internal designations).
nent and unobserved maintenance option is activated
here, but that personnel can be authenticated and author- 6. It must be possible to delete the access rights and authen-
ised in the case of maintenance. How maintenance access tication criteria temporarily set in the system regarding
will in fact have to be later enabled by the operator, for the identities for access by the commissioning engineer.
instance, using a key switch, depends on the purpose of
the system. For some systems, permanent monitoring by
the integrator or a service provider may be desired, for Operation and security maintenance
example, as part of predictive maintenance or condition
monitoring. As already mentioned above in the explana- During the operating phase, the private keys and certificates
tion of the application scenario, the auditability of actual for authentication for OPC UA must be changed at regular
maintenance access is an issue for some operators. But intervals in a secure manner, for instance, if technical pro-
its safe implementation will be the subject of discussion gress or attacks constantly impair the security of crypto
in a later paper. graphic algorithms. A change can be planned when crypto
graphic ageing of methods and algorithms is foreseeable,
whereas an attack in which private keys, for instance, were
stolen is reason for a fast and unscheduled exchange.
20 E X A M I N AT I O N O V E R T H E L I F E C YC L E
A fundamental distinction must be made when changing When private keys and certificates are exchanged, it must
private keys and certificates: be taken into account that some systems or machines have
only limited maintenance windows. This should therefore
• A component/user receives a new private key and a new be carried out early or it should be possible without inter-
certificate must be generated. rupting system operation.
• A component/user has received a new certificate and the If a connection to the system or its components is estab-
certificate is to be authorised (for example, to communi- lished from the operator’s area or vice versa, the system
cate via OPC UA). In the best-case scenario, the authenti- should prove its affiliation to the operator with a ZBN cer-
cation criteria (trust lists) of the other components do tificate. The system should also check the certificate of the
not have to be updated. In some cases, it is necessary to remote station using the operator’s criteria, for example, a
store the new certificate in repository services or even to trust list containing certificates of the operator. A secure
distribute an associated new issuer certificate (sub-CA connection is not established until mutual verification has
certificate) to other components via a distribution taken place. If the system or its components establish a
mechanism. connection to the integrator or vice versa, for example, for
maintenance purposes, the integrator’s certificates and cri-
• The issuing Certification Authority is changed and all teria must be used analogously. These rules apply especially
components must be informed of this. This means that to connections in which the keys and/or certificates are
certificates from several certification bodies may exist regularly renewed.
during the period of transition. The components must
support and accept this. One principle of security practice is to minimise risks by
using different key pairs for different tasks. For example, if
In the case of certificates for components, a distinction must a key pair with a certificate is used for confidential
also be made between two types of holders. The certificates (encrypted) communication with a component, the same
can come either from the operator or from the integrator. key pair should not be used to authenticate the component
Both are responsible for their respective certificates and or for signatures to be generated by the component, see
must exchange them on the basis of their validity. Access also Table 7, No. 4 in “Sicherheitsanalyse OPC UA” issued by
rights must be defined for the exchange. For this purpose, the Federal Office for Information Security (12). Various
the component must be able to assign rights for certificate risks are thereby reduced, which are justified both in secu-
renewal to different user groups. The same applies to the rity procedures and in organisational applications. For
renewal of the key pairs that belong to the certificates. example, if the same key pair is used for confidential com-
Responsibility for the certificate determines who can initi- munication and authentication, some authentication
ate the renewal of the key pair. methods can cause the key holder, i. e. the component, to
decrypt for others confidential material intended for the
User authorisations can change over time. That’s why it key holder. Some authentication procedures require the
should be possible to change the authorisations used by component to be able to decrypt a random number that is
the components or to change authentication servers. Again, unknown to the component but encrypted with its public
a distinction must be made between the different user key. However, if the attacker does not reinvent an encrypted
groups of the operator and the integrator, because access random number but selects another confidential and en
authorisation may not be mutually overwritten. It should crypted message intended as a task for the component,
even be possible to change user group assignments over decryption will then be delivered to the attacker virtually
time, because changes in personnel responsibilities due free of charge during the authentication process.
to changes in organisational structures or changes in the
operator or integrator’s technical infrastructure will neces- In security practice, using different key pairs for authentica-
sitate changes in processes. tion and negotiation of symmetric keys for encrypting
messages would also support the use of so-called middle-
boxes at trust boundaries in such a way that communications
can be read by key deposit measures or sub-CA instances in
a middlebox without this also compromising the authentic-
ity of communications.
E X A M I N AT I O N O V E R T H E L I F E C YC L E 21
That’s because middleboxes would only require keys or 2. Authentication and authorisation criteria for identities
sub-CA instances which are stored for decryption. They should be
would not have to be trained for authentication and hence
falsification of messages. The auditability of data traffic 2.1 renewed regularly and
across trust boundaries will be the subject of a future paper
which will address this circumstance once again. 2.2 separately for each person responsible (integrator
versus operator).
Regular operations with maintenance results in the follow-
ing security requirements for a system with Industry 4.0 3. When establishing a connection to the system or its
components: components or in the opposite direction, it should be
possible to select
1. In the case of identities and the pertinent certificates as
well as key material, 3.1 which identity and which certificate are relevant
(integrator versus operator) and
1.1 it should be possible to renew them without inter-
ruption and 3.2 which verification criteria are relevant for verify-
ing the remote station and its users.
1.2 depending on the issuer, it should be possible to
renew them on different paths (integrator certifi- 4. Different keys and certificates should be used for encryp-
cate versus operator certificate).. tion and authentication/signing.
22 E X A M I N AT I O N O V E R T H E L I F E C YC L E
One proven approach in this case is to take a snapshot of cannot gain possession of them. This also eliminates the
data and the states of the affected system for later analysis above-described need to renew private keys and certificates
and then to bring the data and states of the system back up after an attack. This paper does not take a more detailed
to an operational state before the analysis is completed. look at the requirements for secure elements since they are
This state can be restored from a backup copy of a (pre- not the focus of this discussion. It should be noted, however,
sumably) not yet manipulated state. To be able to do this, that due to the use of several certificates and pertinent key
the operator must also be able to make backup copies and pairs, which has already become apparent in the course of
to reload these again. He must also be able to take a snap- the discussion above, requirements for secure elements
shot as quickly as possible with or without the integrator’s would certainly need to be discussed.
assistance. Sensitive data must be protected both when
making and restoring backup copies and when taking snap- The following security requirements apply to support for
shots. The operator may not gain possession of sensitive restoring operations and contingency measures:
integrator data (e.g. know-how of the plant application) and
vice versa (e.g. private keys to operator’s certificates or log 1. It should be possible to take snapshots of system and
data related to operator’s personnel). component data (log data, temporary data, etc.) for
forensic purposes, so that they do not contain any sen-
Simple restoration of a secure configuration is not always sitive information but still allow an analysis of security
easily possible, since at this point in time the target system incidents.
is in an insecure and perhaps even unknown state. There-
fore, different measures must be selected from case to case 2. It should be possible to make and restore backup copies
(e. g. configuration reset, reload software or replace compo- of systems and components in such a way that sensitive
nents completely). data is still protected in the backup copies and restora-
tion only transfers the sensitive data to components in
Unfortunately, simply restoring a formerly safe state is often a trusted state.
not enough. Unauthorised access could result in the seizure
of private keys to certificates. In this case, it would be even 3. It should be possible to quickly exchange key pairs and
easier than before for the attacker to repeatedly intervene pertinent certificates in the case of components that
and manipulate – this time virtually indistinguishable from have probably been compromised.
authorised access – so that simple restoration would create
a false impression of regular operations whereas in fact 4. For users, components should support certificate
ongoing attacks are still successful. Therefore, if sensitive authentication and/or verify passwords using an
data material, such as private keys, is suspected of being authentication service.
compromised, new key pairs must be generated and new
certificates issued as a precautionary measure. In cases like
these, passwords are much more difficult to replace if their
comparison values (the so-called password hashes) are
stored on the devices.
Solution sketch/discussion
S O LU T I O N S K E TC H / D I S C U S S I O N 25
The security requirements show that digital identities are • The second mechanism is called “push management”
needed from different sources. As a reminder, the terms and defines an information model for OPC UA applica-
used for the sources and identities are repeated here: tions that are an OPC UA server. Via this interface, a
management application can update the trust lists from
1. Identities issued by the component manufacturer the GDS according to a schedule in the target server,
(e. g. ZHN manufacturer certificates) i. e. copy them there. The management application works
in both directions as an OPC UA client, both to the GDS
2. Identities assigned by the integrator and to the target server. The standard does not define
(e. g. ZIN certificates) where the management application runs. It is conceivable
for this application to be located near the GDS, providing
3. Optional identities valid in the system several OPC UA servers with new information for trust
(e. g. ZAN certificates) lists. For a server with “push management” capability,
the standard defines more precisely that the target server
4. Identities issued by the operator must have an object called “ServerConfiguration” under
(e. g. ZBN certificates) which various certificate groups are referenced with each
group representing a trust list.
26 S O LU T I O N S K E TC H / D I S C U S S I O N
Figure 5: Localisation of the security domains using machine A as an example – without the manufacturer’s domain
SD-I
IoT Gateway
Machine A
Local Switch
SD-A
Component Component
A.1 A.2
SD-B
Component Component Component Component
A.1.1 A.3 A.2.1 A.2.2
With OPC UA, a trust list contains precisely the informa- The trust lists must be managed accordingly
tion needed to check certificates of a security domain in
the form of trusted certificates, optionally additional certif- • one trust list for devices and software processes issued
icates to complete certificate chains (issuer certificates) and by the pertinent CA, and
optionally revocation information. OPC UA defines two
types of trust lists in the standard (via the certificate • optionally one trust list for user identities, issued by the
groups), i.e. those for checking application certificates and pertinent CA.
those for checking user certificates. This distinction
matches the above security requirements. It is quite possible for this information to also be distrib-
uted in other ways. This approach takes into account the
In the solution sketches described below, the two methods requirement, i.e. to propose as little as possible in addition
of certificate management via OPC UA and Global Discov- to OPC UA, which was already explained in the introduc-
ery Server (GDS) are used, so that all of the components or tion with regard to the significance of OPC UA.
relevant plant parts in each security domain with a GDS
and the underlying Certification Authorities (CAs) receive Instead of using a set of trust lists for each security domain,
copies of the trust lists. Several CAs can play a role here: it is also conceivable to provide the same set of trust lists
for different domains within a GDS. However, this would
• one CA for devices and software processes and raise the question as to who is responsible for maintaining
the security domain. As soon as other security domains are
• optionally one CA for user identities. included in a scenario, for instance, by suppliers, it becomes
clear that, instead of helping, this kind of mixed managed
S O LU T I O N S K E TC H / D I S C U S S I O N 27
trust list leads to even greater complexity. Similarly, it is Providing the system with different trust lists, own certifi-
possible to include only parts of a certification hierarchy of cates and password check criteria is depicted in Figure 6
another Certification Authority in a trust list, for example, below using the example of the SD-I and SD-B security
in order to declare certain plant parts of another security domains. Every component communicating via OPC UA
domain to be trusted. It is also necessary once again to requires trust lists and own certificates. For more complex
weigh up the complexity of responsibility issues with the systems, it makes sense to regularly copy the trust lists once
technical simplification in the form of a lower number of from one domain to the system and to distribute them
trust lists to be distributed. This paper does not examine from there, for example, with a local OPC UA server that
any further the more complex organisational procedures serves as a GDS proxy with a cache for the components in
but instead the solutions describe in simple terms the the system. This concept is only outlined here and will not
approach with strictly separated trust lists for each security be discussed further. In Figure 6, the SD-I security domain
domain. is the Certification Authority (CA) for the devices and soft-
ware processes shown as CA-ID and for the CAs for the users
Since the release of version 1.04 in November 2017, the shown as CA-IU. The pertinent VL-ID and VL-IU trust lists
OPC UA standard describes in the “Services” (16) and “Map- are provided and distributed via the GDS called “GDS-I”.
pings” (17) sub-documents new possibilities for authenti- For the SD-B domain, this is carried out in the same way
cating users, for instance, using OAuth2 with JSON Web via the GDS-B by the CAs called CA-BD and CA-BU with
Tokens to check passwords with check criteria that can be the VL-BD and VL-BU trust lists.
stored in an LDAP server.
Figure 6: Provision of (copies of) trust lists and password verification information
OPC UA VL-ID
GDS-I VL-ID
SD-A OAuth2
Component Component
A.1 A.2
SD-B
Component Component Component Component
A.1.1 A.3 A.2.1 A.2.2
Figure 7: Provision of (copies of) trust lists and password verification information
IoTGateway
Certification Authority CA-AU LDAP-A
Machine A Certification Authority CA-AD
Local Switch
OAuth2
OPC UA VL-AD
GDS-A VL-AD
Component Component
SD-A
A.1 A.2
Figure 6 also shows that passwords can be used instead of domain. The password verification information is not repli-
certificates in order to authenticate users. Besides a con- cated, however, communication takes place indirectly with
ventional method, i. e. the use of passwords configured locally the OAuth2 servers.
in components and the pertinent verification criteria (tables
with user names and passwords), as described above, the The fact that a Certification Authority can also distribute
OPC UA standard describes the use of OAuth2 as a network trust lists within a system in the SD-A security domain is
method for authenticating users. Locally configured pass- shown in Figure 7 as an example. The certification authori-
word tables have disadvantages that have already been dis- ties, the LDAP server and the trust lists are named in the
cussed in the examination of the lifecycle. There are also same way as the previous examples.
disadvantages to using OAuth2:
Besides OPC UA, another protocol is required when using Provision of identities (certificates and key pairs)
OAuth2 and this causes user authentication to fail if the
OAuth2 server(s) is/are not available. For pull management and push management, Part 12 of
the OPC UA standard “Discovery” (15) explains not only the
Certificates for users, on the other hand, allow new authen- provision of trust list copies, but also the provision of digi-
tication processes to be performed for an interim period tal identities in the form of asymmetric key pairs and the
without current replication of trust lists. In the main, obso- pertinent certificates. Using both methods, an OPC UA
lete revocation information forms the limit for the interim application can obtain (pull management) or provide (push
period. The Certification Authority usually defines how management) the required number of certificates. It is up
long revocation information can be used. to the application whether it generates the corresponding
key pair itself or whether it receives it from the providing
No security domain must (but can) support both methods end. This is ideal for supporting cryptographically weak
of user authentication, i. e. with certificates and/or OAuth2. devices that do not have sources of good random numbers
Figure 6 shows an example of an LDAP server called for generating keys. At the same time, devices are sup-
“LDAP-I” with an upstream OAuth2 mechanism in the SD-I ported that have a secure element for generating and pro-
domain and an LDAP server called “LDAP-B” in the SD-B tecting key pairs and especially the private key, such as
S O LU T I O N S K E TC H / D I S C U S S I O N 29
devices with a Trusted Platform Module (TPM), as is already • erver manufacturers are at liberty to implement a
S
the case with most PC platforms today. different procedure.
The OPC UA standard allows an OPC UA client to choose • he OPC UA standard not only describes the effect
T
which certificate to use with the server as part of a secure of roles and rights in the OPC UA server, it also
connection setup. An OPC UA server can offer multiple defines
endpoints and define a certificate and key pair for each
endpoint to be used. If an OPC UA server uses several end- • t heir presentation to clients and users who are
points, it is still a single process within an operating system. allowed to view this information,
Internally, the same address space and slightly or com- • extensions of the information model for chang-
pletely different address spaces can be displayed behind ing the assignment of rights and roles to the
each endpoint, i. e. sets of nodes and their references. The individual nodes in the server address space,
OPC UA server remains a single OPC UA application. When • a mechanism (IdentityMappingRuleType) for
a client connects to a server, the client indicates to the mapping identities of OPC UA clients and users
server, through the URL of the endpoint, the endpoint to using
which the client wishes to connect.
—— a ttributes of users from their authentication
The solution sketches here assume that an OPC UA server tokens (e. g. attributes from their JSON Web
offers precisely the same number of endpoints within a Token, such as their group or role affiliation),
system as the number of communication relationships that —— their certificates,
it supports in security domains. A component with an OPC —— the endpoint selected for communication
UA server, which is to be able to communicate both within and
the system, with the operator and the integrator, therefore —— certain combinations thereof.
has three endpoints, one each for the domains: SD-A, SD-I
and SD-B. For each of these endpoints, it uses a certificate • Part 4-1 of IEC 62443 (4) defines for components with
which it has received via the GDS of the respective domain. the CR 2.1 requirement and its RE2 extension that the
enforcement of authorisation for human users must be
Similarly, the OPC UA clients of all of the system compo- based on roles and the assignment of roles to human
nents issue their certificates via the GDS of the respective users must be directly definable or modifiable, or via
domain. The communication relationships needed are compensation mechanisms by IT security.
already shown with illustrations in the previous discussion.
• The IEC/TS 62351-8 (20) standard, which is binding for
the energy sector, stipulates that authorisation must be
Authorisation of communication and interaction partners implemented on a role-based access control system for
(partners) data exchange with devices for the energy sector.
In the above examination of the lifecycle, access control Attribute-based access control systems (ABAC for short), on
mechanisms and authorisation mechanisms, such as roles the other hand, are comparatively new and not yet wide-
and rights, and alternatively attributes and rules, were spread in industry. A technically sound definition can be
addressed rather awkwardly with regard to user authorisa- found, for instance, in NIST SP 800-162, a “Guide to Attrib-
tion. This is due to the fact that different concepts can now ute based Access Control ...” (21). ABAC systems can be seen
be found in different standards. as a superset of RBAC systems, where rule sets can be used
instead of direct assignments between identities and roles
Role-based access control (RBAC) mechanisms, for instance, in order to define complex mapping functions between
attribute values assigned to an identity, objects or environ-
• are described in the OPC UA standard, version 1.04, ment and the roles to which rights are assigned. To some
released in November 2017, in the “Address Space extent, the OPC UA standard already goes in the direction of
Model” (18) and “Information Model” parts (19), as an ABAC, because it already describes mapping rules between
option for OPC UA servers. attributes from an authentication token and assigned roles.
30 S O LU T I O N S K E TC H / D I S C U S S I O N
Taking possession
3 Failure to do so would mean operating with certificates that cannot be revoked either by the integrator or the operator and accordingly an
attacker could introduce into the communication network devices which are from the same manufacturer but were configured by the attacker.
S O LU T I O N S K E TC H / D I S C U S S I O N 31
Integration
Decommissioning
Contingency measures/Restoration
The discussion of contingency measures and restoration in the lifecycle examination already shows that very system-ori-
entated solutions that use the capabilities of the individual components must be provided in both cases. The latter must be
expected for large and small devices with very specific characteristics, so that it is very difficult and too far-reaching to
outline a general solution in the solution discussion. This is therefore not included in this paper. Only individual, selected
security requirements from contingency measures/restoration are dealt with here:
This document discusses the secure integration of a machine In a more detailed document, cross-company communica-
into an operator network with OPC UA. By examining the tion with OPC UA will be examined. An operator model will
requirements over the lifetime of the machine, it can be seen serve as an example here where two stakeholders, i. e. a
that the latest version of the OPC UA standard supports the service provider and a factory operator, have to interact in
necessary functions. Based on the results, suppliers of OPC a secure manner with the same machine. Interaction between
UA toolkits as well as component manufacturers and machine the two security domains and the corresponding require-
designer can develop their offerings further in order to ments for integrity, confidentiality and monitoring will
achieve interoperable and efficient use of the security func- have a key role to play in this analysis.
tions of OPC UA.
37
Glossary
Authentication data – Data with which a communication or interaction partner (in short: partner) proves its identity to
other partners, i.e. authenticates itself. Partners can be individuals, devices and software processes. The other partners use
authentication criteria to verify the identity accordingly. Authentication data can be a user’s user name and password, for
instance, which the user uses when logging on. Authentication data for devices, for instance, can be a certificate and an
asymmetric key pair.
Authentication criteria – Criteria used to verify the identity of communication and interaction partners; these partners can
be individuals, devices or software processes. A table of user names and password hashes, for instance, includes authentica-
tion criteria to verify the passwords of individual users. The user names are the identity in this case. So-called trust lists
can implement authentication criteria. These are lists that include trusted certificates, issuer certificates, and revocation
information to verify certificates. Individual certificates are used as proof of identity for communication partners.
Integrator – A system manufacturer who builds systems using components and lends them to operators or has them leased
by the operator. In this scenario, the integrator takes over the maintenance of the system.
Trust list – Sets of certificates that are used by a component to collect the certificates of communication and interaction
partners (together: partners). See also authentication criteria: Trust lists are therefore a specific type of authentication cri-
teria. In OPC UA “Discovery” (15), the term “Trust List” (also in the TrustList notation) is used for the trust list. There, a trust
list contains a set of certificates that are trusted by definition. Optionally, a trust list can contain a further set of certificates
that can be used to complete certificate paths from the partners’ certificates to the corresponding root certificates (root CA
certificates). In addition, a trust list can contain a set of revoked certificates based on revocation information.
ZIN – Integrator certificates issued by the integrator to identities created by the integrator for the system and its components.
The purpose of these certificates is to establish beyond a doubt during communication with the systems or components
that communication is with a system created by the integrator or with a component installed by the integrator.
ZBN – Certificates issued by the operator to identities created by the operator for the system and its components, so that
when communicating with the system or components it can be established beyond a doubt that communication is with
a system operated by the operator or with components installed in the system.
ZAN – Certificates within a system issued by the system for identities created by the system, for instance, to enable a security
domain within a system for secure communication by its components.
ZHN – Certificates issued by the manufacturer to identities created by the manufacturer for devices also created by the
manufacturer, for instance, in order to be able to determine the origin of the device without a doubt when communicat-
ing with the device.
38
List of illustrations
Figure 6: Provision of (copies of) trust lists and password verification information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Figure 7: Provision of (copies of) trust lists and password verification information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
References
1. Discussion paper “Sichere Kommunikation für Industrie 4.0”. Berlin: Plattform Industrie 4.0, 2017.
3. Welche Kriterien müssen Industrie 4.0 Produkte erfüllen? Frankfurt/Main: ZVEI, 2016.
6. IT-Security in der Industrie 4.0: Handlungsfelder für Betreiber. Berlin: Plattform Industrie 4.0, 2016.
7. Information technology – Security Techniques – Information Security Management System. ISO/IEC 27000:2014.
8. Integrität von Daten, Systemen und Prozessen als Kernelement der Digitalisierung. Frankfurt: ZVEI, 2018.
9. NE 153: Automation Security 2020 – Anforderungen an Design, Implementierung und Betrieb künftiger industrieller
Automatisierungssysteme. Leverkusen: NAMUR, 2015.
10. Technical overview of “Sichere unternehmensübergreifende Kommunikation”. Berlin: Plattform Industrie 4.0, 2016.
12. Sicherheitsanalyse OPC UA. s.l.: German Federal Office for Information Security (BSI), 25 April 2016.
14. Practical Security Recommendations for building OPC UA Applications. Scottsdale, AZ: OPC Foundation, 2017.
15. OPC Unified Architecture Part 12: Discovery. OPC Unified Architecture Specification Part 12: Discovery Release 1.03.
s.l.: OPC Foundation, 19 July 2015.
16. OPC Unified Architecture Part 4: Services. OPC Unified Architecture Specification Part 4: Services Release 1.04.
s.l.: OPC Foundation, 22 November 2017.
17. OPC Unified Architecture Mappings. OPC Unified Architecture Specifications Part 6: Mappings Release 1.04.
s.l.: OPC Foundation, 22 November 2017.
18. OPC Unified Architecture Part 3: Address Space. OPC Unified Architecture Specification Part 3: Address Space Model
Release 1.04. s.l.: OPC Foundation, 22 November 2017.
19. OPC Unified Architecture Part 5: Information Model. OPC Unified Architecture Specification Part 5: Information Model
Release 1.04. s.l.: OPC Foundation, 22 November 2017.
20. IEC/TS 62351-8. Technical Specification: Power systems management and associated information exxchange – Data and
communications security – Part 8: Role-based access control. s.l.: International Electrotechnical Commission (IEC).
21. NIST Special Publication 800-162. Guide to Attribute Based Access Control (ABAC) Definition and Considerations.
s.l.: National Institute of Standards and Technology (NIST), January 2014.
22. OPC Unified Architecture for Devices. OPC UA Unified Architecture for Devices Companion Specification Release 1.01.
s.l.: OPC Foundation, 25 July 2013.
40
Figure 8 shows the overall “Collaborative Factory“ scenario. This scenario describes interaction between the various
stakeholders in connected production.
Enterprise Operator 1
External Cloud
Internal Cloud
Internal Cloud
DMZ
Enterprise Operator 2
Internal Cloud
Machine A Machine B
IoT - Gateway IoT - Gateway
Operator
A factory operator, “Operator 1” in this case, operates a production facility in which machines from various suppliers are
used. This example uses a tried-and-tested structure. The company’s processes are linked by a central infrastructure, i. e. the
“enterprise” network. A security zone (demilitarized zone “DMZ”) is set up between the enterprise network and the pro-
duction facilities, which securely separates the two parts. The DMZ and the connections passing through it (indirect access
via DMZ systems, direct access by the DMZ, etc.) must be designed on the basis of the requirements for communication
and security.
A P P E N D I X : CO L L A B O R AT I V E FA C TO RY 41
In this example, the machines installed in production are to operate in the “operator model”. They do not belong to the
factory operator, but to the specialised service providers or the machine manufacturers themselves. In the related business
model, “pay per use” could be the option. The suppliers take over maintenance and optimisation for the factory operator.
This model is interesting for the present analysis since the given ownership and responsibility relationships mean that the
factory operator does not have full responsibility and control over the machines, so that security domains have to be
examined on a company-spanning basis.
Collaboration
The most important requirement, of course, is that the machines from the various suppliers operated in the factory must
work together in order to achieve the economic goals pursued by the factory operator. This means that full interoperabil-
ity of all systems and assets involved is essential.
Cloud services
The offerings by external companies to optimise business processes are represented by the “External Cloud”. These offerings
include the services of machine suppliers as well as other possible offerings by other providers. In this respect, the “External
Cloud” symbolises external services outside the area of the factory operator and can comprise several independent offerings.
In this example, the providers of the machines and the corresponding services are the relevant partners. Other offerings
could, for example, come from the manufacturers of the components installed in the machines.
In principle, it should be noted that the service providers will not only look after one factory operator, i. e. “Operator 1”.
Just as the factory operator uses the services of multiple providers, the service providers, for their part, will support other
factory operators. In terms of the model, this means that service providers process data and information from competing
factory operators.
AUTHORS
Carsten Angeli, KUKA Roboter GmbH | André Braunmandl, Bundesamt für Sicherheit in der Informationstechnik | Kai
Fischer, Siemens AG | Torsten Förder, PHOENIX CONTACT Software GmbH | Prof. Dr. Tobias Heer, Hirschmann Automa-
tion & Control GmbH | Dr. Detlef Houdeau, Infineon Technologies AG | Dr. Lutz Jänicke (Leitung), PHOENIX CONTACT
GmbH & Co KG | Dr. Christian Krug, Geschäftsstelle der Plattform Industrie 4.0 | Fabian Mackenthun, NXP Semiconduc-
tors Germany GmbH | Jens Mehrfeld, Bundesamt für Sicherheit in der Informationstechnik | Andreas Pfaff, Mitsubishi
Electric Europe B.V. | Tobias Pfeiffer, Festo AG & Co. KG | Uwe Pohlmann, Fraunhofer-Institut für Entwurfstechnik
Mechatronik | Martin Regen, Microsoft Deutschland GmbH | Andreas Teuscher, SICK AG | Klaus Theuerkauf, Institut für
Automation und Kommunikation e.V. | Dmitry Tikhonov, Assystem Germany GmbH | Thomas Walloschke, Fujitsu Tech-
nology Solutions GmbH
This publication is a joint result of the working groups “Security of Networked Systems”
and “Reference Architectures, Standards and Norms” (Plattform Industrie 4.0).
www.plattform-i40.de