subject: Software Technology of HMI/SCADA [print this page] Software Technology of HMI/SCADA Software Technology of HMI/SCADA
Software over the years has largely become feature-bloated as companies keep adding new capabilities while maintaining all of the existing ones, increasing the complexity of software security. There are two separate but dependent software technologies in the system, the HMI/SCADA software and the platform operating system, which have distinct differences when it comes to security.
HMI/SCADA Software Most HMI/SCADA software installations have either external network connections or direct internet based connectivity to perform remote maintenance functions and/or connect up to enterprise systems. While these types of connections help companies reduce labor costs and increase the efficiency of their field technicians, it is a key entry point for anyone attempting to access with a malicious intent.
Platform Operating System Operating systems that employ elements of consumer or "open" source operating systems such as Windows Server, Linux and Unix variants are increasingly popular since they help reduce costs. This trend toward open technologies has made proprietary custom, closed, highly secure systems a direction of the past. But it increases the risks.
Also, due to the fact that HMI/SCADA systems are complex and contain multiple layers of technology, even a simple system patch is a major undertaking that requires planning, funding and time. The risk elements are also substantial because many systems now rely solely on their HMI/SCADA system for visualization, data recording and some control elements.
The good news is that some vulnerability is minimized by the nature of system design and HMI/SCADA software design, whereby the fundamental principles and canons of engineering mandate and reliable systems. This ensures a basic level of security to protect against an intruder.
Engineers design systems with intentionally broken automated chains-meaning in some cases functions require physical confirmation prior to the software performing commands and in other cases the SCADA software only does a portion of the command. Requiring one or many additional manual steps to execute the function. Inherent system security is best surmised at the software and hardware levels.
Software with many viewing HMI/SCADA software as a visualization tool that provides a means for dynamic operator input and visualization as a flexible information terminal, the reality is that HMI/SCADA software capabilities are much more exhaustive. When elements are added such as control and logic capabilities, system engineers must examine the risk from a potential failures standpoint and the extent of control that is allowed without being in line of sight of the area being controlled.
Software also developed from the operator's perspective and Uses Company guidelines throughout the application to ensure the operator is controlling with intent. While this doesn't necessarily bring additional security from external intruders, it does provide enhanced protection against mistakes.