SlideShare a Scribd company logo
Target Applications. Control systems in different
vertical markets:
ƒƒ Factory Automation – PLC, HMI, Motion Controller
ƒƒ Process Automation – DCS, SCADA, Process controllers
ƒƒ Energy production and distribution – RTU, Gateways, SCADA
ƒƒ Building Automation – BAS, HMI
ƒƒ Mobile Automation - ECU
Embedded Security Shield
Release 01.11.16
Scope
Industrie 4.0 & IIoT
SECURE
CONNECTED
REAL-TIMESMART
A new era of Industrial production has started with Industrie 4.0. The proliferation of connected devices multiplies the risk of attacks on
Cyber Physical Systems. In industrial Automation, many Industrial Control Systems integrate the CODESYS technology from 3S-Smart
Software Solutions. The Embedded Security Shield extends Kaspersky’s Security System (KSS) for a complete integration into CODESYS
and to secure the main communication channel, the CODESYS Gateway.
© BE.services GmbH - All rights reserved.
ICS
Trusted Channel
CODESYS Development System
CODESYS
COM
RTS
CODESYS
CORE
RTS
Kaspersky
Security
System
ESS Security
Editor
RTOS
Authentication Secure Audit
Secure Modes
Configuration
Trusted
Channel
Functionality
ƒƒ Cyber-security of the ICS
ƒƒ Protection of the CODESYS Gateway communication
channel
ƒƒ Configuration of security policies directly in CODESYS
ƒƒ Trusted communication channel with the CODESYS
Development System
ƒƒ Execution of the CODESYS Runtime in a secure environment
ƒƒ Extendable framework to secure customer specific software
tools and communication channels
Integration of the Embedded Security Shield in CODESYS
Configuration of the security modes
Secure Audit
Engagement model
How to get?
Product Manufacturer Part Number Sales Contact
Embedded Security
Shield Toolkit
BE.services GmbH
www.be-services.net
0230113 info@be-services.net
Maintenance and
Support package for ESS
BE.services GmbH
www.be-services.net
0230150 info@be-services.net
© BE.services GmbH - All rights reserved.
Software Package includes
ƒƒ Embedded Software:
-- Embedded Security Shield
-- Kaspersky Security System (KSS)
-- CODESYS Runtime extensions
ƒƒ Development software:
-- ESS Security Editor plug-in for CODESYS
EMBEDDEDSECURITY
SHIELD
Embedded Security Shield3
The CODESYS Runtime System is divided into 2 domains:
ƒƒ Communication
ƒƒ Core
All communication to the ICS is handeld through the Communication runtime. The Core runtime is isolated from any external commu-
nications happening through the CODESYS Gateway (communication with CODESYS, network variables, OPC, OPC UA, PLCHandler, data
server, etc…).
All requests to the ICS come to the Communication Runtime. Their execution is checked by the Kaspersly Security System, a secure,
mathematically proven, engine.
KSS checks the requests with the existing security policies and allows or denies them. The verdict cache retains previous requests to
speed up execution of known past requests.
Security policies are defined and configured by the User’s Security Administrator using the ESS Security Editor provided as an additional
plug-in in CODESYS.
Secure communication for data exchange (security policies configuration, secure audit trail) between the ESS Security Editor and KSS is
managed through specific trusted channel.
Mechanism
Domain 1
(e.g. com stack)
IPC Request
Command
Request
for Verdict
Verdict
delivery
Verdict
Cache
Domain 2
(e.g. application)
Microkernel(OSspecific)
SecurityRuntime
Security
Policies
Security Server
Request (e.g. „stop“)
2
Features and benefits
Made by experts
ESS is based on Kaspersky Lab’s KSS  trusted and recognized
specialist for cyber security
Complete integration
ESS provides the integration of KSS in CODESYS, both in the
runtime and in the IDE  time and cost saving for the imple-
mentation
Performance
Minimal delay caused by the security process  compatible
with systems with hard real time behaviour
Framework
The system is a technology, adaptable to the existing firmware.
Different/additional communication channels can be secured by
the same means  complete security with a single technology
Expertise for support and development
BE.services can be contracted for development, extension or
integration services  time and cost saving through 3rd party
expertise
© BE.services GmbH - All rights reserved.
Technical data
General system information
Runtime size Code 2.7 MB /  3.3 MB (without / with ESS)
Data 0.8 MB / 1.0 MB (without / with ESS)
Communication UDP / Serial / USB
Trusted channel
Supported CPUs X86, ARM, ARM Cortex, PowerPC
Others on demand
Supported operating systems Linux
Others on demand
Performance data
Command Without ESS With ESS
Application download (302 kB) 2.98 s 3.01 s
File transfer (1.5 MB) 28.80 s 28.87 s
OPC access (2000 variables of type byte) 4 ms 5 ms
Test hardware: Xilinx Zynq ZC702 (ARM Cortex A9)
Support
Please contact info@be-services.net
www.be-services.net
Embedded Security Shield4
Evaluation Kit:
Evaluate the Embedded Security Shield on the
Xilinx Zynq ZC702. More information under:
www.be-services.net/industrie-40/xilinx.html

More Related Content

PPTX
Computer security aspects in
PPTX
PDF
Cisco VMDC Cloud Security 1.0 Design Guide
DOCX
Top 5 reasons to purchase cisco asa 5500 series
PDF
AOS - Physical Security Solutions
PDF
CyberoamBrochure
PDF
Brochure network security-en
PDF
Cloud computing security infrastructure
Computer security aspects in
Cisco VMDC Cloud Security 1.0 Design Guide
Top 5 reasons to purchase cisco asa 5500 series
AOS - Physical Security Solutions
CyberoamBrochure
Brochure network security-en
Cloud computing security infrastructure

What's hot (15)

PDF
Cybercom Enhanced Security Platform
PDF
Cisco Trustsec & Security Group Tagging
PPTX
Sem cis ise
PDF
What is needed in the next generation cloud trusted platform ?
PDF
Windows 7 security enhancements
PPTX
Implementing cisco network security
PDF
Implementing cisco network security
PPTX
Cisco security trainings
PPSX
ISE_Pub
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
PPTX
Can Cloud Solutions Transform Network Security
PDF
Cloud computing security plan for compliance
PPSX
Business Mobility - otevřete svou mysl k tomu, co je možné
PPTX
Windows Server 2008 Security Enhancements
RTF
Corero Protects Its Customers From 'Apache Killer' DoS Exploit
Cybercom Enhanced Security Platform
Cisco Trustsec & Security Group Tagging
Sem cis ise
What is needed in the next generation cloud trusted platform ?
Windows 7 security enhancements
Implementing cisco network security
Implementing cisco network security
Cisco security trainings
ISE_Pub
Laser Pioneer Secures Network End-to-End to Protect Assets
Can Cloud Solutions Transform Network Security
Cloud computing security plan for compliance
Business Mobility - otevřete svou mysl k tomu, co je možné
Windows Server 2008 Security Enhancements
Corero Protects Its Customers From 'Apache Killer' DoS Exploit
Ad

Viewers also liked (19)

PDF
PresentaionAS
PDF
Top 50 middle eastern brands
PDF
exceRpt: A computational exRNA-seq analysis pipeline
PPTX
Rosewood group of Hotels & and Resorts: Branding to increase customer profita...
PDF
Building Your First Chatbot - A Beginner's guide
PDF
สรุป วิทยาศาสตร์ ว 23102
PPTX
Insights from Univenture 2015 by Nathan Lessons
PDF
Скидки и акции в гипермаркетах Магнит с 24 февраля по 08 марта 2016
DOC
Rajasekhar -Having 2.6 years of Exp in to Cognos
PDF
ppConscious Leaders v11.17
DOCX
ABCD Profile Book 2016
PDF
Snack de Publicidad.
PDF
About Lego Serious Play
PDF
Diogo Rendeiro - Field notes on scaling product management - Productized16
PDF
Additive Manufacturing, #hype or #reality?
PDF
Making AutoRun USB HID Device / 自動入力するHIDデバイスを安く簡単に作る
DOCX
Hoja de vida de Jose Leonardo Molina Gutierrez
PDF
The Conflict Fast Model - Agile2016
PDF
3D Printing: The presence - The Future
PresentaionAS
Top 50 middle eastern brands
exceRpt: A computational exRNA-seq analysis pipeline
Rosewood group of Hotels & and Resorts: Branding to increase customer profita...
Building Your First Chatbot - A Beginner's guide
สรุป วิทยาศาสตร์ ว 23102
Insights from Univenture 2015 by Nathan Lessons
Скидки и акции в гипермаркетах Магнит с 24 февраля по 08 марта 2016
Rajasekhar -Having 2.6 years of Exp in to Cognos
ppConscious Leaders v11.17
ABCD Profile Book 2016
Snack de Publicidad.
About Lego Serious Play
Diogo Rendeiro - Field notes on scaling product management - Productized16
Additive Manufacturing, #hype or #reality?
Making AutoRun USB HID Device / 自動入力するHIDデバイスを安く簡単に作る
Hoja de vida de Jose Leonardo Molina Gutierrez
The Conflict Fast Model - Agile2016
3D Printing: The presence - The Future
Ad

Similar to Datasheet_Embedded_Security_Shield (20)

PDF
Kl iot cebit_dg_200317_finalmktg
PDF
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
PDF
Embedded device-care Point of View - security
PDF
Code Signing with CPK
PPTX
Recon: Hopeless relay protection for substation automation
PPTX
The Future of Embedded and IoT Security: Kaspersky Operating System
PPTX
Cyber security applied to embedded systems
PPTX
Automotive Bootloader Complete Guide with UDS Frame Format
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Embedded Systems Security: Building a More Secure Device
PDF
NSC #2 - D2 01 - Andrea Allievi - Windows 8.1 Patch Protections
PDF
EFI Secure Key
PDF
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
PPTX
introduction to Embedded System Security
PDF
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
PDF
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
DOCX
Hardwar based Security of Systems
PDF
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
PDF
AutomotiveBootloaderaaaaaaaaaaaaaaaaaaaa.pdf
PDF
The Current State of Automotive Security by Chris Valasek
Kl iot cebit_dg_200317_finalmktg
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Embedded device-care Point of View - security
Code Signing with CPK
Recon: Hopeless relay protection for substation automation
The Future of Embedded and IoT Security: Kaspersky Operating System
Cyber security applied to embedded systems
Automotive Bootloader Complete Guide with UDS Frame Format
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
NSC #2 - D2 01 - Andrea Allievi - Windows 8.1 Patch Protections
EFI Secure Key
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
introduction to Embedded System Security
IDF_Eclipse_Plugin_EclipseCon2020_v2.pdf
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
Hardwar based Security of Systems
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
AutomotiveBootloaderaaaaaaaaaaaaaaaaaaaa.pdf
The Current State of Automotive Security by Chris Valasek

Datasheet_Embedded_Security_Shield

  • 1. Target Applications. Control systems in different vertical markets: ƒƒ Factory Automation – PLC, HMI, Motion Controller ƒƒ Process Automation – DCS, SCADA, Process controllers ƒƒ Energy production and distribution – RTU, Gateways, SCADA ƒƒ Building Automation – BAS, HMI ƒƒ Mobile Automation - ECU Embedded Security Shield Release 01.11.16 Scope Industrie 4.0 & IIoT SECURE CONNECTED REAL-TIMESMART A new era of Industrial production has started with Industrie 4.0. The proliferation of connected devices multiplies the risk of attacks on Cyber Physical Systems. In industrial Automation, many Industrial Control Systems integrate the CODESYS technology from 3S-Smart Software Solutions. The Embedded Security Shield extends Kaspersky’s Security System (KSS) for a complete integration into CODESYS and to secure the main communication channel, the CODESYS Gateway. © BE.services GmbH - All rights reserved. ICS Trusted Channel CODESYS Development System CODESYS COM RTS CODESYS CORE RTS Kaspersky Security System ESS Security Editor RTOS Authentication Secure Audit Secure Modes Configuration Trusted Channel Functionality ƒƒ Cyber-security of the ICS ƒƒ Protection of the CODESYS Gateway communication channel ƒƒ Configuration of security policies directly in CODESYS ƒƒ Trusted communication channel with the CODESYS Development System ƒƒ Execution of the CODESYS Runtime in a secure environment ƒƒ Extendable framework to secure customer specific software tools and communication channels Integration of the Embedded Security Shield in CODESYS
  • 2. Configuration of the security modes Secure Audit Engagement model How to get? Product Manufacturer Part Number Sales Contact Embedded Security Shield Toolkit BE.services GmbH www.be-services.net 0230113 info@be-services.net Maintenance and Support package for ESS BE.services GmbH www.be-services.net 0230150 info@be-services.net © BE.services GmbH - All rights reserved. Software Package includes ƒƒ Embedded Software: -- Embedded Security Shield -- Kaspersky Security System (KSS) -- CODESYS Runtime extensions ƒƒ Development software: -- ESS Security Editor plug-in for CODESYS EMBEDDEDSECURITY SHIELD Embedded Security Shield3 The CODESYS Runtime System is divided into 2 domains: ƒƒ Communication ƒƒ Core All communication to the ICS is handeld through the Communication runtime. The Core runtime is isolated from any external commu- nications happening through the CODESYS Gateway (communication with CODESYS, network variables, OPC, OPC UA, PLCHandler, data server, etc…). All requests to the ICS come to the Communication Runtime. Their execution is checked by the Kaspersly Security System, a secure, mathematically proven, engine. KSS checks the requests with the existing security policies and allows or denies them. The verdict cache retains previous requests to speed up execution of known past requests. Security policies are defined and configured by the User’s Security Administrator using the ESS Security Editor provided as an additional plug-in in CODESYS. Secure communication for data exchange (security policies configuration, secure audit trail) between the ESS Security Editor and KSS is managed through specific trusted channel. Mechanism Domain 1 (e.g. com stack) IPC Request Command Request for Verdict Verdict delivery Verdict Cache Domain 2 (e.g. application) Microkernel(OSspecific) SecurityRuntime Security Policies Security Server Request (e.g. „stop“) 2 Features and benefits Made by experts ESS is based on Kaspersky Lab’s KSS  trusted and recognized specialist for cyber security Complete integration ESS provides the integration of KSS in CODESYS, both in the runtime and in the IDE  time and cost saving for the imple- mentation Performance Minimal delay caused by the security process  compatible with systems with hard real time behaviour Framework The system is a technology, adaptable to the existing firmware. Different/additional communication channels can be secured by the same means  complete security with a single technology Expertise for support and development BE.services can be contracted for development, extension or integration services  time and cost saving through 3rd party expertise
  • 3. © BE.services GmbH - All rights reserved. Technical data General system information Runtime size Code 2.7 MB /  3.3 MB (without / with ESS) Data 0.8 MB / 1.0 MB (without / with ESS) Communication UDP / Serial / USB Trusted channel Supported CPUs X86, ARM, ARM Cortex, PowerPC Others on demand Supported operating systems Linux Others on demand Performance data Command Without ESS With ESS Application download (302 kB) 2.98 s 3.01 s File transfer (1.5 MB) 28.80 s 28.87 s OPC access (2000 variables of type byte) 4 ms 5 ms Test hardware: Xilinx Zynq ZC702 (ARM Cortex A9) Support Please contact info@be-services.net www.be-services.net Embedded Security Shield4 Evaluation Kit: Evaluate the Embedded Security Shield on the Xilinx Zynq ZC702. More information under: www.be-services.net/industrie-40/xilinx.html