• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
CDP Studio logo

CDP Studio

The no-code and full-code software development tool for distributed control systems and HMI

  • Why CDP
    • Software developers
    • Automation engineers
    • Managers
  • Product
    • Design UI
    • Develop
    • Analyze and test
    • Deploy
    • Framework and toolbox
    • Compatibility
  • Services
  • Use cases
  • Pricing
  • Try CDP

CDP Studio Documentation

Cybersecurity Requirements User Administration

Security

Security Overview

Industrial Automation Control Systems (IACS) have traditionally been isolated systems running inside restricted facilities, making them hard to breach. The Industrial Internet of Things has made it a lot simpler for the business to get automatic metrics straight from the production-site, by connecting systems to the Internet. Many organizations also allow control of the systems via the internet; saving labor, time and reducing errors introduced by manual routines. The Internet makes everything more accessible. Criminal organizations, rogue states, and other 'Black Hat' hackers are constantly searching for systems to take control of for their purpose. Every day, bots are scanning the web, looking for insecure, exploitable systems. Many companies have experienced attacks over the years, and only some of these have reached the media. For example, the Ukrainian Power grid was hacked. Colonial Pipeline in the USA was hacked. Social engineering is utilized to get access to company secrets or to give access to restricted information or areas. Without appropriate measures, an entire facility can be put out of commission by just putting a USB disk into an unsecured computer.

We use the term cybersecurity as the ability to prevent, detect and respond to harmful actions to an Industrial Automation Control System. The ISA/IEC 62443 standard lists several security levels, ranging from SL0 (no security) to SL4 (highest security). It sets specific requirements that must be met to fulfill a given security level. The higher the security level that has been properly implemented, the harder it becomes to breach an Industrial Automation Control System.

Control systems can be considered more secure when they have:

  • Several layers of security, where each layer implements one or more barriers to provide protection.
  • Logging and detection, which aims to give notification about barrier breaches.
  • Responses and actions, that are triggered by the detection mechanisms

See Also

  • CDP Studio Security Manual
  • Security Configurator Web UI
  • How to create an end user administrator account
  • CDP - Resilience Against Unauthorized Access
  • IEC 62443 Cybersecurity Requirements

Cybersecurity Requirements User Administration

The content of this document is confidential information not to be published without the consent of CDP Technologies AS.

CDP Technologies AS, www.cdpstudio.com

Get started with CDP Studio today

Let us help you take your great ideas and turn them into the products your customer will love.

Try CDP Studio for free
Why CDP Studio?

CDP Technologies AS
Hundsværgata 8,
P.O. Box 144
6001 Ålesund, Norway

Tel: +47 990 80 900
E-mail: info@cdptech.com

Company

About CDP

Contact us

Services

Partners

Blog

Developers

Get started

User manuals

Support

Document download

Release notes

Follow CDP

  • LinkedIn
  • YouTube
  • GitHub

    © Copyright 2022 CDP Technologies. Privacy and cookie policy.

    Return to top