System and methodology providing automation security architecture in an industrial controller environment
First Claim
1. An automation security system, comprising:
- an asset component to define one or more factory assets;
an access component to define one or more security attributes associated with the factory assets; and
a security component to regulate access to the factory assets based upon the one or more security attributes.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security depending on one or more security models, system capabilities, and/or other factors such as risk and cost-based assessments, for example. The security models can include asset and access based models having respective security attributes that describe the type of automation component to be accessed and the type of access permitted within the automation component such as a read and/or write access. Other type attributes include time and location information that further control outside network access to automation components.
303 Citations
33 Claims
-
1. An automation security system, comprising:
-
an asset component to define one or more factory assets;
an access component to define one or more security attributes associated with the factory assets; and
a security component to regulate access to the factory assets based upon the one or more security attributes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An automation security system, comprising:
-
one or more servers that manage a network interface between networked factory assets and other devices or users attempting access to the networked factory assets; and
a security management module associated with the network interface for enforcing an enterprise wide policy and to manage security threats directed to the networked factory assets. - View Dependent Claims (21, 22, 23)
-
-
24. An automation security methodology, comprising:
-
analyzing one or more automation assets;
modeling the automation assets in accordance with network security considerations; and
developing a security framework for an automation system based in part on the modeling of the automation assets and a network access type. - View Dependent Claims (25, 26, 27)
-
-
28. An automated security system for an industrial control environment, comprising:
-
means for defining one or more security attributes associated with at least one network request;
means for processing the one or more security attributes; and
means for controlling access to at least one of a network device and an automation component based in part on the one or more security attributes.
-
-
29. A security schema for a factory automation system, comprising:
-
a first data field to describe factory assets;
a second data field to describe security parameters for the factory assets; and
a schema to associate the first and second data fields, the schema employed to limit access to the factory assets based upon the security parameters. - View Dependent Claims (30, 31, 32, 33)
-
Specification