Technology
Industrial edge control security design and best practices SOURCE: OPTO 22
To address security’s complex, changing nature, system designers need to understand security risks and their environment, along with the security tools they have to work with. Security experts recognize several elements of system security including physical security, policies and procedures, and network security.
A trusted network is any network where you know exactly who has access to it. An untrusted network is any network where you don’t know who has access, like the Internet.
For all digital systems, security is a complex issue with different implications depending on the organization and systems. Security system requirements constantly change as the control system evolves, and building security into the system design is key to success. As Bruce Schneier wrote in 2000, “Security is a process, not a product.” To address security’s complex, changing
nature, system designers need to understand security risks and their environment, and the security tools they have to work with. Security experts recognize several elements of system security, including physical security, policies and procedures, and network security. Technology such as Opto 22’s groov EPIC has been designed to address network security requirements as a primary goal. SOURCE: OPTO 22
THE LATEST GENERATION OF EDGE CONTROL technology has been designed from the ground up to help system designers build a secure system for gathering, processing, and sharing useful data from industrial equipment. The result is industrial real-time controller technology that has been designed to maintain a high level of cyber security features and configurable options.
A WiFi network (a WLAN) can be added to the edge controller using an approved USB WiFi adapter connected to the EPIC processor’s USB port.
18
in d u s t r ial et h er ne t b o o k
2.2020