Efficiency in implementing real-time data aggregation and visualization applications that are secure against the latest cyber attack is now needed in the modern control systems, especially in managing several different user profile scheme.
At the beginning of the control system is introduced, you have found the network with PLC, instruments, PC control and business applications connected simply without isolation that can be accessed by anyone directly. Today it is no longer relevant given ware vulnerable to cyber attacks that require a protocol for connecting Server and Client Application exclusively. How could this happen and how the implementation of the secure distributed HMI systems? Check This Out 10 Essential features to implement secure distributed HMI systems as below:
1. Tag-Level Security
Identification security system with read and write using the user interface at the tag level allows enabling screens and input fields based on user credentials. However, this system has the disadvantage that the restricted display inside the data will not be presented then you need to Leverage Tag-Level Security.
2. Integrating Multiple User Security Models
Multiple security system capable of managing multiple control functions as well as identifying and defining authorization, keeping applications and data centralized server, handles the Active-Directory and Windows Authentication and using the Windows Integrated Security, users from partner companies may use the WS-Federation login.
3. Security and Web Gateways
Network gateway function is to protect the server from cyber attacks, especially if the network security managing multiple models simultaneously, it takes the appropriate gateway network configuration. One web security concept Gateways the most widely used data application server is isolated, and deploy gateway independently
4. Smart Clients
Several new products still rely on tools HMIs using pixel graphics, which depends on the resolution, instead of vector graphics that require maximum data access capabilities of the browser. You need smart clients with several features such as automatically updates the application core, No installation required and automatically start the client application
5. Concurrent Engineering and Hot Start
The ability to make changes offline in the configuration of the project known as Hot Start needs uninterrupted client connections requires some features of secure distributed HMI systems such as: Configuring multi-user SQL-centric: instead of a flat file, the project configuration is stored in a SQL database, allowing concurrent access simple from some users.
6. Built-in Redundancy
Control system in a configuration script requires features such as hot-standby redundancy for server tag real-time and main and backup devices (PLC) addresses. This facilitates the process for data acquisition client-side applications automatically and transparently to the backup server.
7. Synchronization Tools, Store and Forward
In the production process industry, settings database storage have the option of using the Store and Forward, and automatic replication of the redundant applications. Storage and forwarding process is used to store data, with easy setup via the crossings and firewalls are neatly arranged.
8. Built-in Communication Protocols
Application of external OPC is a great solution to have direct access to the built-in standard protocols. But some independent tool will lead to the management and maintenance more expensive so that in addition to OPC, you need the support of control devices such as PLC General network (Modbus, Rockwell, Siemens, Beckhoff, Omron, Mitsubishi, Koyo, GE, National Instruments and others) and IT protocols (indicator of performance, SNMP, Ping).
9. Remote Stations and Automated Management
Server OPC has a weakness when the process of storing the entire configuration in the application server, not on the node of data acquisition so you need to open firewall ports for DCOM or manage security certificates OPC-UA. For further developments, you can take advantage of technologies such as WCF (Windows Communication Foundation), known as Remote Stations and Automated Management
10. Network Transport-layer Independence
Connections in the implementation of secure distributed HMI systems need to activate the service remotely, synchronously or asynchronously. One option is to utilize the Microsoft .NET WCF (Windows Communication Foundation) which have better security arrangements that do not require some additional programming scenarios.
Conclusion
Check the list of 10 essential features to implement a secure distributed HMI system above is helpful in controlling the company's management to efficiently flexible and secure systems with the most recent cyber security company Recommendations and finally will get Easily managing updates and providing a greater user experience.