System Configuration Check Against Security Policies in Industrial Networks
Contributo in Atti di convegno
Data di Pubblicazione:
2012
Abstract:
Awareness that networked embedded systems are
vulnerable to cyber-threats has been constantly raising since
some years ago. In the industrial arena recent severe attacks,
such as the popular case of the Stuxnet worm, have completely
debunked the myth of security of embedded devices based on
their isolation. Indeed, the ever increasing dependence of many
industrial systems on digital communication networks is causing
the cyber-security requirements to become a priority in their
planning, design, deployment and management.
This paper deals with our experience in checking the conformance
of a distributed industrial automation system, which
includes several types of embedded devices, with respect to a set of
security policies defined at the global system level. In particular,
the focus of the paper is on the use of modeling techniques and
semi-automated s/w tools to verify the configuration of devices
and services with attention to the correct use of their security
capabilities to support the desired set of policies.
Tipologia CRIS:
04.01 Contributo in Atti di convegno
Keywords:
Role-based access control (RBAC); security policies; automatic analysis; networked embedded systems
Elenco autori:
Cheminod, Manuel; Durante, Luca; Valenzano, Adriano
Link alla scheda completa:
Titolo del libro:
7th IEEE International Symposium on Industrial Embedded Systems (SIES), June 20 - June 22, 2012, Karlsruhe, Germany, Conference Proceedings. -