Additional Security for PROFINET

  • Post category:PI NEWS
  • Reading time:3 min(s) read

Already very early – in parallel with the first PROFINET specifications – PI published an extensive security concept, which was further refined and adapted in multiple steps. It is not sufficient simply to protect plant networks and automation components, rather the protective mechanisms and concepts must not interfere with a running production operation. Moreover, protection concepts must be easy to implement and remain affordable. The most important aspect, however, is that the concepts must be adapted time and again to current developments. PI has now expanded its IT security concept.

The IT security concept used for PROFINET employs a defense-in-depth approach. With this method, the production plant is protected against attacks – particularly from the outside – by means of a multi-layer perimeter (including, among other things, firewalls). In addition, further safeguarding within the plant is possible by dividing into zones through the use of firewalls. Furthermore, a security component test ensures the ability of the PROFINET components to withstand overloading in a defined scope. This concept is supported by organizational measures in the production plant within the framework of a security management system.

Security is, however, a topic that must be continuously adapted to the current development and, as a result, is never finished. This applies in particular with respect to the increased networking of production plants. The use of PROFINET components with added value, e.g., web or OPC communication, thereby ensures increased, direct communication with higher-level systems outside of the security zone. At the same time, it is becoming increasingly difficult to separate PROFINET networks.

Moreover, networks are becoming larger, meaning that more and more components are connected together and interacting with one another. A successful attack on a single (PC) system within such a cell, therefore, bypasses upfront security measures. Widely distributed plants also hinder the physical protection of networks and access points. Unauthorized persons can thereby gain access to a PROFINET network.

For these reasons, previous concepts, which rely primarily on isolating production plants, must be supplemented with new concepts that enable protection within the cell. PI, therefore, expanded the previous measures with further-reaching protective measures. This includes a credential management system, e.g., for authentication of devices and an end-to-end security expansion for PROFINET communication as a configuration option. As not every application has the same security requirements, three security classes were defined for PROFINET.

Further technical details and practical examples can be found in the Industry 4.0 highlight “Security” at www.profibus.com/technology/industrie-40/. In this campaign on the PI website, current topics, issues, and trends from Industry 4.0 applications are addressed so that the user can easily implement and realize them in practical work.