CN109587159A - A kind of comprehensive industry control security evaluation System and method for - Google Patents

A kind of comprehensive industry control security evaluation System and method for Download PDF

Info

Publication number
CN109587159A
CN109587159A CN201811563751.9A CN201811563751A CN109587159A CN 109587159 A CN109587159 A CN 109587159A CN 201811563751 A CN201811563751 A CN 201811563751A CN 109587159 A CN109587159 A CN 109587159A
Authority
CN
China
Prior art keywords
user
assessment
tool
security
evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811563751.9A
Other languages
Chinese (zh)
Inventor
王进
孙帅
何跃鹰
邹潇湘
林冠洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201811563751.9A priority Critical patent/CN109587159A/en
Publication of CN109587159A publication Critical patent/CN109587159A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications

Abstract

The present invention relates to industrial control system security evaluation technology technical field, in particular to a kind of comprehensive industry control security evaluation System and method for, including system administration, mirror image management, Container Management and assessment knowledge data base;The system administration includes accounting management, resource management and access control;The mirror image management includes the management to risk assessment, configuration safety inspection and robustness safe test tool mirror image;Robustness safe test tool, configuration tool of secure examining, risk assessment tool are encapsulated deployment to cloud by means of application container technology by it, and develop corresponding access control, user management and billing function, to one industrial control system security evaluation system based on cloud platform of construction, the assessment demand for breaking existing expensive, the inefficient business model based on special testing tool and vast industrial enterprise does not match that brought predicament.

Description

A kind of comprehensive industry control security evaluation System and method for
Technical field
The present invention relates to industrial control system security evaluation technology technical field, in particular to a kind of comprehensive industry control is surveyed safely Comment System and method for.
Background technique
Modern industry infrastructure includes electric power, oil and gas, chemical industry, water conservancy, industry manufacture and traffic control etc. Key industry constitutes the important foundation of Chinese national economy, modern society and national security.It is crucial in industrial infrastructure It may cause casualties, serious economic loss, infrastructure using the failure of, system to be destroyed, environmental disaster, jeopardize public affairs All living creatures' work and national security etc..Industrial control system constitutes the nervous system of modern industry infrastructure.Traditionally, industry control System processed is mostly the close network for using special technology, is not interconnected externally, the information security threats faced do not protrude. Correspondingly, various industrial control equipments, application, system, communication protocol are all designed mainly for proprietary enclosed environment.Due to Not real information security threats, during design, realizing with deployment, main indicator is industrial automation control system Availability, function, performance, (physics) safety, real-time etc., and need not excessively consider network attack, information security the problems such as.
In recent decades, various industrial control systems just rapidly move towards open, interconnection (packet from closing, isolated system Include and interconnected with traditional IT system), increasingly industry is controlled as the communications infrastructure using Ethernet/IP/TCP network Application layer of the protocol migration processed to ICP/IP protocol stack;Using the various wireless networks including including IWLAN, GPRS etc.;Extensively The commercial operation systems such as the Windows using standard, equipment, software, middleware and various general technologies.Typical industry is automatic Networked control systems, including SCADA (data acquisition analysis system), DCS (dcs), PLC (programmable logic control Device processed) etc., just increasingly becoming open, general and standardization.Industrial control system enjoy open, interconnection technique bring into While step, efficiency and interests, it is also faced with the security threat got worse.It is right due to the promotion of long-term lacking demand for security The security threat shortage being widely present under (using general technologies such as TCP/IP) network environment is fully realized, existing Industry Control The system past lacks safety meaning almost complete absence of information security is considered the problems of in design, research and development again in deployment, O&M Knowledge, management, process, strategy and the support of relevant speciality technology, lead in many industrial control systems that there is such or such Safety problem will result in various serious security incidents once being not intended to or malicious exploitation.By the practice and spy of many years Rope, countries in the world, which more or less all have appreciated that, carries out comprehensive security evaluation for industrial control system, finds out, grasps industry Security threat control system potential security risk and faced helps to push each correlation of industrial control field with this as the starting point The each side such as mechanism, client and manufacturer participate in jointly, cooperate, the existing industrial control system of improve and perfect, and research and develop and more pacify Entirely, reliable new industrial control system.
In the world, ISA safety-compliant association is actively working to carry out the industry control of ISASecure project development in recent years System evaluation authentication specifications processed.ISASecure authentication specifications are by industrial control system unit of operation, employer's organization, user, science Boundary, government cooperate to formulate jointly with regulatory agency, it is therefore an objective to industrial control system equipment supplier and unit of operation be helped to identify Network security product and practice.EDSA provides a set of general equipment and process as first ISASecure authentication specifications Specification ensures embedded device safety from each stage such as equipment development, production, buying, it is therefore intended that industrial trade is promoted to reinforce Industrial control system network security.EDSA defines safety guarantee and requires three equipment certification levels improving step by step: rank 1, Rank 2 and rank 3.Three ranks all authenticate following technology essential factor: software development safety evaluation, functional safety are commented Estimate, communicate robustness testing.SDSA is used for the safety of detection device in the process of development, and FSA is for examining functions of the equipments Safety, CRT test equipment guarantee necessary take when from normally under high network rate by normal and Abnormal network traffic The ability of business.Requirement of the rank 2 and 3 for SDSA and FSA be it is incremental step by step, CRT standard be suitable for each rank.
Industrial control system constitutes the nervous system of modern industry infrastructure.The safety of industrial control system is directly closed It is the production safety to each priority industry industry, thus becomes industrial automation and information security research emphasis, heat in recent years Point field.
In recent years, with the automation of China's key industry infrastructure field industrial automation control system, digitlization, net The continuous improvement of network degree, interconnection, the intercommunication of industrial automation control system and IT network also greatly increase.Industrial automation Control system also starts to be faced with increasingly severe while enjoying opening, the progress of interconnection technique bring, efficiency and interests Security threat, specifically include:
(1) plant downtime as caused by virus, Malware etc.;(2) core data, formula of industry manufacture are stolen It takes;(3) Diao Zao factory and its crucial industry control production procedure are destroyed;(4) foul manipulation industrial control data or application software;(5) right Unwarranted access of industrial control system function etc..
Although the security threat of industrial automation control system is originated from IT, network technology in the increasingly wide of industrial control field General application, but industrial control system still has the characteristics that itself, it is simple to be difficult to be adapted to industry control ring using the IT safe practice of standard The specific safety demand of control protocol, equipment, application, standard under border.For industrial information safety, it is necessary first to meet control The requirement of the high availability of system, followed by integrality.Since under industry control environment, most data are all between equipment and equipment Communication, therefore security target again is only confidentiality.So the security postures of Yao Gaijin industrial control system, first The security evaluation for needing to carry out industrial control system system is identified and is divided to potential Security Vulnerability existing for it Analysis, reasonably studies and judges the security threat that industrial control system faces, can just suit the remedy to the case to make is suitable for industrial control The security solution of system processed.
According to international standard IEC 62443, (information) of industrial control system is related to three big aspects safely, strategy It is related to demand for security of the industry security in terms of tissue and process with process;What system involved how to realize safety is System;Component is related to forming the safety of the component (product etc.) of industrial control system.It is corresponding, for industrial control system Security evaluation technology and tool also just include: risk assessment, be based on IEC 62443 and ISO 27000, for Industry Control system Whether the asset owner of system and the tissue of supplier and process meet assessing for industry security;Risk assessment with match Set safety inspection, security evaluation carried out to the framework of industrial control system, function based on IEC 62443, identification be present in design, The safety defect of framework and functional plane;Safety inspection is carried out to system configuration simultaneously, is recognized whether due to unsafe Security Vulnerability brought by configuring.Robustness safety test, based on ISASecure EDSA to industrial control equipment, software group Part carries out robustness safety test, and identification is present in the safety defect of realization level.
Summary of the invention
In view of the defects and deficiencies of the prior art, the present invention intends to provide a kind of comprehensive industry control security evaluation systems With method.
To achieve the above object, the technical solution adopted by the present invention is that:
A kind of comprehensive industry control security evaluation system of the present invention, including system administration, mirror image management, Container Management and Assessment knowledge data base;
The system administration includes accounting management, resource management and access control;
Wherein: (1) access control in system administration is industrial control system security test and evaluation system based on cloud There is provided user identifier, authentication and authorization function, it is ensured that only allow legal user to access the assessment function by authorization, together When the management of user information, voucher, permission is also provided;
(2) user had both included using the user of assessment function of the present invention, also included the management that O&M is carried out to system Member user;
(3) it in resource management, provides to calculating, the United Dispatching of storage resource and support needed for whole system;
(4) it in accounting management, records and manages user to the service condition of every assessment function, support in different modes Charging is carried out to the service condition of user;
The mirror image management includes the pipe to risk assessment, configuration safety inspection and robustness safe test tool mirror image Reason;
Wherein: mirror image management in, industrial control system security test and evaluation system based on cloud by risk assessment, configuration The different editions of the evaluation tool of safety inspection and robustness safety test are integrated to be independent mirror image, and by mirror image management function Unified storage, security protection are provided;
The Container Management includes to risk assessment tool application container, configuration tool of secure examining application container and stalwartness The management of property safe test tool application container;Industrial control system security evaluation system integral deployment based on cloud in cloud, The cloud computing environment of operation is public cloud, private clound or mixed cloud;
Wherein: (1) in Container Management, application container may be based on but not limited to virtual machine, docker or rocket;It is being based on In the industrial control system security test and evaluation system of cloud, when user needs using specific evaluation tool to Industry Control system When system carries out assessment, container management function is responsible for loading corresponding tool mirror image, so that each tool instance works in one In a independent application container;
(2) container management function is also responsible for carrying out configuration appropriate to tool application container, so that being encapsulated in application container In evaluation tool can be tested and assessed by user's normal use for the safety to industrial control system;
(3) it tests and assesses knowledge data base, the integrated industrial control system security evaluation tool of this system can directly will be safe Check item needed for test and evaluation, plug-in unit, script etc. are integrated into the mirror image/application container of tool itself;Can also will own Into a self contained data base, the application container of evaluation tool passes through network at runtime for data integration relevant to assessment knowledge The mode of access obtains the data such as correspondence proving item, plug-in unit, script for testing and assessing.
A kind of method of industrial control system security evaluation system based on cloud, comprising the following steps:
Step 1, user log on to the industrial control system security evaluation system for being deployed in cloud;
Step 2, the work that evaluation system provides and is able to carry out risk assessment, configures safety inspection and robustness safety test The assessment plug-in unit list for having list and the offer of each tool is selected for user;
Step 3, evaluation system select corresponding evaluation tool mirror image from mirror image management, load it and operate to application Container provides the service of SaaS mode from cloud for user;
As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve and industrial controlled from cloud to tested The lasting network connection of system processed, user may be selected to dispose preposition assessment master in advance in tested industrial control system environment Machine, assessment host is server or other special equipments, before assessment starts, application container is downloaded on assessment host and is transported Behavior user provides assessment service;
Step 4, user's use works in cloud or the evaluation tool application container of preposition assessment host is tested and assessed;
Step 5, after assessment, user downloads the knot tested target industrial control system, assessed from cloud Fruit;
Further, in the step one, the access control components of evaluation system execute authentication and access is controlled System inquires its security policy database according to the voucher that user provides, check whether security strategy allows the user to access;To not awarding The user of power refuses its access;To legitimate user, system is allowed a user to log into;
When the user of industry customer, assessment mechanism or manufacturer need to carry out safety test and risk for industrial control system When assessment, user needs to log on to the industrial control system security test and evaluation system for being deployed in cloud, and the mode of login is User name/password, the cipher authentication based on public key certificate;To ensure communication safety, the communication between user and evaluation system is adopted It is carried out with SSL/TLS, HTTPS encrypted tunnel is not limited to.
Further, in the step two, user selects corresponding tool or even assessment to insert according to the needs of its assessment Part;And corresponding payment mode is selected, specific payment mode is prepaid billing mode, post-paid mode, free trial mode;This The access control components for inventing the evaluation system will access accounting management component, the accounting management plan becheduleding for according to system Slightly, the charge mode according to selected by user is determined, if the user is allowed to use security evaluation function.
Further, in the step three, for the items industry provided using evaluation system with guaranteeing user security Control system security evaluation tool, evaluation system provide testing tool use service overall process in, using SSL/TLS, HTTPS, OpenVPN, IPSecVPN technology provide the secure communication between user;Plug-in unit needed for assessment is stored in assessment knowledge In database, the application container of starting also needs to load and correspond to from assessment knowledge data base according to the selected plug-in unit of user Tool insert;
Evaluation system selects corresponding evaluation tool mirror image from mirror image management, loads it and operates to application container, is The service of user's offer SaaS mode;As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve from cloud The lasting network connection of tested industrial control system is held, user also may be selected in tested industrial control system environment in advance Preposition assessment host is disposed, assessment host is that server or other special equipments will be under application containers before assessment starts It is downloaded on assessment host and user's offer assessment service is provided.
Further, in the step four, the evaluation tool application container for working in cloud can be used to carry out for user Assessment, specifically includes:
(1) security evaluation tool of the application based on IEC 62443 carries out system to the general safety of industrial control system Risk assessment;
(2) application configuration tool of secure examining is to the subsystem in industrial control system, various host computers and its application, net The baseline whether configuration of network equipment, field control equipment reaches current predefined security configuration carries out automation inspection;
(3) robustness safe test tool is applied, the peace of system is carried out to industrial control equipment, application or even system Full test identifies concurrently existing existing security breaches.
Further, in the step five, user tests target industrial control system from cloud downloading, comments It is estimating as a result, specifically include, risk assessment, analysis report and optional but be not limited to, corresponding risk resolution is suggested;System Configure the report of safety inspection result, emphasis is listed in assessment unsafe configuration for finding and optional but be not limited to, and provides Corresponding improvements in security suggestion;The security breaches that find in robustness safety test and optional but be not limited to, reappear these leakages Network flow file and script, executable program needed for hole.
Further, in the step six, after assessment, evaluation system of the present invention closes user's application Application container, according to the charge mode that user selects, expense is included in user account by the accounting management component of calling system.
After adopting the above structure, the invention has the following beneficial effects: a kind of comprehensive industry control security evaluation system of the present invention With method, it by means of application container technology by robustness safe test tool, configuration tool of secure examining, risk assessment tool Deployment is encapsulated to cloud, and develops corresponding access control, user management and billing function, so that construction one flat based on cloud The industrial control system security evaluation system of platform, provides complete security evaluation tool set, can cover needed for IEC 62443 Risk assessment, configuration safety inspection, robustness safety test different levels demand for security, thus for vast industrial enterprise, Associated safety assessment mechanism provide resource shared resources, with need to take, expansible, the full-featured security evaluation system of height, Break existing expensive, the inefficient assessment demand based on the business model of special testing tool and vast industrial enterprise not phase With brought predicament.
Detailed description of the invention
Fig. 1 is general frame figure of the invention;
Fig. 2 is work flow diagram of the invention.
Fig. 3 is the measures schematic diagram that evaluation tool application container of the present invention works in cloud.
Fig. 4 is the assessment of the present invention downloaded from cloud and run in evaluation tool application container to preposition assessment host Schematic diagram.
Specific embodiment
The present invention will be further described below with reference to the drawings.
As shown in Figure 1, a kind of comprehensive industry control security evaluation system of the present invention, including system administration, mirror image management, Container Management and assessment knowledge data base;
The system administration includes accounting management, resource management and access control;
Wherein: (1) access control in system administration is industrial control system security test and evaluation system based on cloud There is provided user identifier, authentication and authorization function, it is ensured that only allow legal user to access the assessment function by authorization, together When the management of user information, voucher, permission is also provided;
(2) user had both included using the user of assessment function of the present invention, also included the management that O&M is carried out to system Member user;
(3) it in resource management, provides to calculating, the United Dispatching of storage resource and support needed for whole system;
(4) it in accounting management, records and manages user to the service condition of every assessment function, support in different modes Charging is carried out to the service condition of user;
The mirror image management includes the pipe to risk assessment, configuration safety inspection and robustness safe test tool mirror image Reason;Wherein: in mirror image management, industrial control system security test and evaluation system based on cloud is safe by risk assessment, configuration It checks and the different editions of the evaluation tool of robustness safety test integrates and are independent mirror image, and provided by mirror image management function Unified storage, security protection;
The Container Management includes to risk assessment tool application container, configuration tool of secure examining application container and stalwartness The management of property safe test tool application container;Industrial control system security evaluation system integral deployment based on cloud in cloud, The cloud computing environment of operation is public cloud, private clound or mixed cloud;Wherein: (1) in Container Management, application container can be based on but It is not limited to virtual machine, docker or rocket;In industrial control system security test and evaluation system based on cloud, work as user When needing to carry out assessment to industrial control system using specific evaluation tool, container management function is responsible for loading corresponding tool Mirror image, so that each tool instance works in an independent application container;
(2) container management function is also responsible for carrying out configuration appropriate to tool application container, so that being encapsulated in application container In evaluation tool can be tested and assessed by user's normal use for the safety to industrial control system;
(3) it tests and assesses knowledge data base, the integrated industrial control system security evaluation tool of this system can directly will be safe Check item needed for test and evaluation, plug-in unit, script etc. are integrated into the mirror image/application container of tool itself;Can also will own Into a self contained data base, the application container of evaluation tool passes through network at runtime for data integration relevant to assessment knowledge The mode of access obtains the data such as correspondence proving item, plug-in unit, script for testing and assessing.
As shown in Fig. 2, a kind of method of industrial control system security evaluation based on cloud, comprising the following steps: its feature It is:
Step 1, user log on to the industrial control system security evaluation system for being deployed in cloud;
Step 2, the work that evaluation system provides and is able to carry out risk assessment, configures safety inspection and robustness safety test The assessment plug-in unit list for having list and the offer of each tool is selected for user;
Step 3 loads it as shown in figure 3, evaluation system selects corresponding evaluation tool mirror image from mirror image management Application container is operated to, provides the service of SaaS mode from cloud for user;
As shown in figure 4, as by assessment environment network bandwidth or safety/management strategy limit, cannot achieve from cloud to The lasting network connection of tested industrial control system, user may be selected before disposing in advance in tested industrial control system environment The assessment host set, assessment host are that application container is downloaded to survey before assessment starts by server or other special equipments It comments and user's offer assessment service is provided on host;
Step 4, user's use works in cloud or the evaluation tool application container of preposition assessment host is tested and assessed;
Step 5, after assessment, user downloads the knot tested target industrial control system, assessed from cloud Fruit;
Further, in the step one, the access control components of evaluation system execute authentication and access is controlled System inquires its security policy database according to the voucher that user provides, check whether security strategy allows the user to access;To not awarding The user of power refuses its access;To legitimate user, system is allowed a user to log into;
When the user of industry customer, assessment mechanism or manufacturer need to carry out safety test and risk for industrial control system When assessment, user needs to log on to the industrial control system security test and evaluation system for being deployed in cloud, and the mode of login is User name/password, the cipher authentication based on public key certificate;To ensure communication safety, the communication between user and evaluation system is adopted It is carried out with SSL/TLS, HTTPS encrypted tunnel is not limited to.
Further, in the step two, user selects corresponding tool or even assessment to insert according to the needs of its assessment Part;And corresponding payment mode is selected, specific payment mode is prepaid billing mode, post-paid mode, free trial mode;This The access control components for inventing the evaluation system will access accounting management component, the accounting management plan becheduleding for according to system Slightly, the charge mode according to selected by user is determined, if the user is allowed to use security evaluation function.
Further, in the step three, for the items industry provided using evaluation system with guaranteeing user security Control system security evaluation tool, evaluation system provide testing tool use service overall process in, using SSL/TLS, HTTPS, OpenVPN, IPSecVPN technology provide the secure communication between user;Plug-in unit needed for assessment is stored in assessment knowledge In database, the application container of starting also needs to load and correspond to from assessment knowledge data base according to the selected plug-in unit of user Tool insert;
Evaluation system selects corresponding evaluation tool mirror image from mirror image management, loads it and operates to application container, is The service of user's offer SaaS mode;As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve from cloud The lasting network connection of tested industrial control system is held, user also may be selected in tested industrial control system environment in advance Preposition assessment host is disposed, assessment host is that server or other special equipments will be under application containers before assessment starts It is downloaded on assessment host and user's offer assessment service is provided.
Further, in the step four, the evaluation tool application container for working in cloud can be used to carry out for user Assessment, specifically includes:
(1) security evaluation tool of the application based on IEC 62443 carries out system to the general safety of industrial control system Risk assessment;
(2) application configuration tool of secure examining is to the subsystem in industrial control system, various host computers and its application, net The baseline whether configuration of network equipment, field control equipment reaches current predefined security configuration carries out automation inspection;
(3) robustness safe test tool is applied, the peace of system is carried out to industrial control equipment, application or even system Full test identifies concurrently existing existing security breaches.
Further, in the step five, user tests target industrial control system from cloud downloading, comments It is estimating as a result, specifically include, risk assessment, analysis report and optional but be not limited to, corresponding risk resolution is suggested;System Configure the report of safety inspection result, emphasis is listed in assessment unsafe configuration for finding and optional but be not limited to, and provides Corresponding improvements in security suggestion;The security breaches that find in robustness safety test and optional but be not limited to, reappear these leakages Network flow file and script, executable program needed for hole.
Further, in the step six, after assessment, evaluation system of the present invention closes user's application Application container, according to the charge mode that user selects, expense is included in user account by the accounting management component of calling system.
The present invention is specifically further described with having the present embodiment:
Specific embodiment one: for the purpose of the present invention, a kind of feasible embodiment (but being not limited to) is that can be used for industry The embodiment that the components such as equipment, software in control system or subsystem carry out robustness safety test is as follows:
When the user of including assessment mechanism or manufacturer (but be not limited to) need in industrial control system equipment, When the components such as software or subsystem carry out robustness safety test, user needs using (but not limited to this mode) user name/close Code logs on to evaluation system of the present invention.
To ensure communication safety, the communication between user and evaluation system is using (but being not limited to) HTTPS (based on newest ) etc. TLS encrypted tunnels carry out.
The access control components of evaluation system of the present invention execute authentication and access control, i.e., are provided according to user Voucher (Credential) inquire its security policy database, check whether security strategy allows the user to access.
After logging in system by user success, into the tool and plug-in unit selection interface of system of the present invention, robustness is selected After safe test tool, further can need plug-in unit to be tested by option, plug-in unit can (but being not limited to) carry out as follows Grouping,
By institute's agreement to be tested, such as industrial control protocols Modbus/TCP, PROFINET, EtherNet/IP, IT neck Application layer protocol FTP, the HTTP in domain etc. or even IP, TCP, UDP of ICP/IP protocol stack etc.;
Test method includes the various abnormal inputs that tool can be generated, and specifically includes (but being not limited to) flooding, failure Injection, structure variation etc.;The characteristics of user needs to test Industry Control product, component, subsystem according to it selects robustness peace The correspondence probe card of full testing tool, and select corresponding payment mode.
Since user may select the agreement for carrying out the second layer to Industry Control product in robustness security testing process The test of (such as Ethernet, ARP, PROFINET-DCP), and the application layers such as common HTTPS VPN can not forward the second layer Communication frame.So the present invention supports (but being not limited to) to establish the evaluation system and user in a manner of OpenVPN, IPSec etc. Between VPN traffic tunnel, such VPN can forward the communication frame of the second layer, it is ensured that can produce to the Industry Control of user terminal Product carry out safety test.But in such a mode, user needs to download a VPN client from evaluation system of the present invention End, for establishing and the VPN traffic of evaluation system.
Corresponding robustness safety test plug-in unit has been selected in user, has been configured with corresponding test parameter and test assignment Afterwards, evaluation system of the present invention selects robustness safe test tool mirror image from mirror image management, loads it to operate to and answer With container, which is that user's (but being not limited to, an application container can also be multiple users) provides SaaS (Software As a Service) mode robustness safety test service.
As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve and industrial controlled from cloud to tested The lasting network connection of system processed, user also may be selected to dispose preposition assessment in advance in tested industrial control system environment Host, assessment host can (but being not limited to) be server or other special equipments, before assessment starts, by the stalwartness in cloud Property safe test tool application container download on assessment host, by the way that directly operation is fixed according to user demand on assessment host The application container of system provides robustness safety test service for user.
Optionally, plug-in unit needed for robustness safety test can be stored in assessment knowledge data base, the stalwartness of starting Property safe test tool application container corresponding insert can be loaded from assessment knowledge data base according to the selected plug-in unit of user Part.
User using work in the robustness safe test tool application container in cloud or preposition assessment host by means of The channel VPN that (2) step is established, (network interface, application service connect possible attack planes various to target industrial control equipment Mouth, file interface etc.) it carries out including the various safety tests such as flooding, direct fault location, structure variation, behavior abuse.
During the test, if the failures such as delay machine, exception occurs in tested industrial control system, user can be by means of stalwartness Property the Web gui interface that provides of safe test tool application container, by hand to reappeared the reason of may cause failure, it is fixed Position.The automation positioning function that robustness safety test itself can also be used, determines the test case for directly resulting in failure Position.
After robustness safety test, user can be downloaded from evaluation system of the present invention to target Industry Control It is that equipment is tested as a result, specifically include (but being not limited to), the description information of test process, found in robustness safety test Security breaches and optional but be not limited to, network flow file and script, executable program needed for reappearing these loopholes Deng.
After assessment, the robustness safe test tool application that evaluation system of the present invention closes user's application is held Device, according to the charge mode that user selects, expense is included in user account by the accounting management component of calling system.
The access control components of evaluation system of the present invention will access accounting management component, the meter becheduleding for according to system Take management strategy, determine the charge mode according to selected by user, if the user is allowed to use security evaluation function.
Specific embodiment two: for the purpose of the present invention, a kind of feasible embodiment (but being not limited to) is that can be used for industry The embodiment that control system carries out security configuration safety inspection is as follows:
It is the subsystem that needs to be directed to as the user of including assessment mechanism or industry customer (but be not limited to), various upper Machine and its application, the network equipment, field control equipment configuration whether safety, if the predefined safe base of configuration can be reached Line, when carrying out automation safety inspection, user needs to log on to institute of the present invention using (but not limited to this mode) usemame/password State evaluation system.
To ensure communication safety, the communication between user and evaluation system is using (but being not limited to) HTTPS (based on newest ) etc. TLS encrypted tunnels carry out.
The access control components of evaluation system of the present invention execute authentication and access control, i.e., are provided according to user Voucher inquire its security policy database, check for allow the user access strategy.
After user's success login system, into the tool and plug-in unit selection interface of system of the present invention, selection safety is matched Tool of secure examining is set, and can further select to need configuration safety inspection plug-in unit to be used, according to target industrial control system group The type of part, plug-in unit may include the component that (but being not limited to) checks host computer OS, application, database, control to scene The component that the firmware version of system processed, the service of opening are checked, it is right to the component that industrial control network equipment is checked The component etc. that entire industrial control network structure is checked.
The characteristics of industrial control system that user needs to check according to it, selects the correspondence of security configuration tool of secure examining Probe card, and select corresponding payment mode.
Here, also needing industrial control system security configuration tool of secure examining beyond the clouds and the client in user Between establish credible, safe communication, with realize security configuration tool of secure examining to the secure access of industrial control system with It checks.Therefore, the present invention supports (being singly not limited to) to directly adopt common SSL/TLS VPN access system under test (SUT).According to specific The difference of realization, user need (it is also not necessary to) to install dedicated VPN traffic client in its client computer of testing and assessing, are used for Establish the VPN traffic with evaluation system.
Corresponding security configuration safety inspection plug-in unit has been selected in user, has been configured with corresponding inspection parameter and coherence check After task, evaluation system of the present invention selection industrial control system from mirror image management configures tool of secure examining mirror image, will Its load operating is application container, which is that the sole user (but is not limited to, an application container can also be multiple use Family) the configuration tool of secure examining service of SaaS (Software as a Service) mode is provided.
As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve and industrial controlled from cloud to tested The lasting network connection of system processed, user also may be selected to dispose preposition assessment in advance in tested industrial control system environment Host, assessment host can (but being not limited to) be server or other special equipments.Before assessment starts, by the configuration in cloud Tool of secure examining application container downloads on preposition assessment host, is selected by directly running on assessment host according to user The application container of customization is selected, industrial control system is provided for user and configures safety inspection service.
Optionally, the plug-in unit as needed for carrying out security configuration tool of secure examining is stored in assessment knowledge data base, is opened It is also needed when the application container of dynamic security configuration tool of secure examining according to the selected plug-in unit of user, from assessment knowledge data base It is middle to load corresponding plug-in unit.
User directly uses the industrial control system configuration tool of secure examining application on cloud or preposition assessment host Container, by means of the channel VPN that second step is established, according to predefined security configuration template (baseline), to target Industry Control (but being not limited to) each subsystem, equipment, host, application, component carry out configuration safety inspection in system.Specifically include (but it is unlimited In), the current-configuration of goal systems is extracted, is compared with predefined industrial control system security configuration.If it find that mesh Unsafe configuration is used in mark industrial control system, and (such as unnecessary service, weak passwurd, there are the software/firmwares of loophole Version etc.), configuration tool of secure examining described in the present embodiment can be recorded.
After industrial control system configures safety inspection, user can be downloaded from evaluation system of the present invention to mesh The configuration of mark industrial control system carry out safety inspection as a result, specifically include (but being not limited to), configure in security-check process Descriptive information, emphasis list in configuration security-check process unsafe configuration for finding and optional but be not limited to how The safety recommendation improved, for instructing user to realize the configuration of safety.
After assessment, the configuration tool of secure examining application that evaluation system of the present invention closes user's application is held Device, according to the charge mode that user selects, expense is included in user account by the accounting management component of calling system.
The above description is only a preferred embodiment of the present invention, therefore all according to feature described in present patent application range and original Done equivalent change or modification is managed, is included in the scope of the patent application of the present invention.

Claims (8)

1. a kind of comprehensive industry control security evaluation system, it is characterised in that: including system administration, mirror image management, Container Management and survey Comment knowledge data base;
The system administration includes accounting management, resource management and access control;
Wherein: (1) access control in system administration provides for industrial control system security test and evaluation system based on cloud User identifier, authentication and authorization function, it is ensured that only allow legal user to access the assessment function by authorization, simultaneously also The management of user information, voucher, permission is provided;
(2) user had both included using the user of assessment function of the present invention, also included administrator's use that O&M is carried out to system Family;
(3) it in resource management, provides to calculating, the United Dispatching of storage resource and support needed for whole system;
(4) in accounting management, record and manage user to the service condition of every assessment function, support in different modes to The service condition at family carries out charging;
The mirror image management includes the management to risk assessment, configuration safety inspection and robustness safe test tool mirror image;
Wherein: in mirror image management, industrial control system security test and evaluation system based on cloud is safe by risk assessment, configuration It checks and the different editions of the evaluation tool of robustness safety test integrates and are independent mirror image, and provided by mirror image management function Unified storage, security protection;
The Container Management includes to risk assessment tool application container, configuration tool of secure examining application container and robustness peace The management of full testing tool application container;Industrial control system security evaluation system integral deployment based on cloud is in cloud, operation Cloud computing environment be public cloud, private clound or mixed cloud;
Wherein: (1) in Container Management, application container may be based on but not limited to virtual machine, docker or rocket;Based on cloud In industrial control system security test and evaluation system, when user needs to open industrial control system using specific evaluation tool When exhibition assessment, container management function is responsible for loading corresponding tool mirror image, so that each tool instance works in one solely In vertical application container;
(2) container management function is also responsible for carrying out configuration appropriate to tool application container, so that being encapsulated in application container Evaluation tool can be tested and assessed by user's normal use for the safety to industrial control system;
(3) assessment knowledge data base, the integrated industrial control system security evaluation tool of this system can be directly by safety test It is integrated into the mirror image/application container of tool itself with check item, plug-in unit needed for assessment, script;It can also be by all and assessment For the relevant data integration of knowledge into a self contained data base, the application container of evaluation tool passes through network access at runtime Mode obtains correspondence proving item, plug-in unit, script data for testing and assessing.
2. a kind of comprehensive industry control security evaluation method according to claim 1, it is characterised in that: the following steps are included:
Step 1, user log on to the industrial control system security evaluation system for being deployed in cloud;
Step 2, the Facility Column that evaluation system provides and is able to carry out risk assessment, configures safety inspection and robustness safety test The assessment plug-in unit list that table and each tool provide is selected for user;
Step 3, evaluation system select corresponding evaluation tool mirror image from mirror image management, load it and operate to application container, The service of SaaS mode is provided from cloud for user;
As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve from cloud to tested Industry Control system The lasting network connection of system, user may be selected to dispose preposition assessment host in advance in tested industrial control system environment, Host of testing and assessing is server or other special equipments, before assessment starts, application container is downloaded on assessment host and is run Assessment service is provided for user;
Step 4, user's use works in cloud or the evaluation tool application container of preposition assessment host is tested and assessed;
Step 5, after assessment, user downloads the result tested target industrial control system, assessed from cloud.
3. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step one In, the access control components of evaluation system execute authentication and access control, i.e., inquire its peace according to the voucher that user provides Full policy library, checks whether security strategy allows the user to access;To the user of unauthorized, refuse its access;To legitimate user, Allow a user to log into system;
When the user of industry customer, assessment mechanism or manufacturer need to carry out safety test and risk assessment for industrial control system When, user needs to log on to the industrial control system security test and evaluation system for being deployed in cloud, and the mode of login is user Name/password, the cipher authentication based on public key certificate;To ensure communication safety, the communication between user and evaluation system is not using It is limited to the progress of SSL/TLS, HTTPS encrypted tunnel.
4. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step two In, user selects corresponding tool or even assessment plug-in unit according to the needs of its assessment;And corresponding payment mode is selected, it is specific to pay Taking mode is prepaid billing mode, post-paid mode, free trial mode;The access control components of evaluation system of the present invention will Accounting management component is accessed, the accounting management strategy becheduleding for according to system determines the charge mode according to selected by user, if The user is allowed to use security evaluation function.
5. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step three In, for the every industrial control system security evaluation tool provided using evaluation system with guaranteeing user security, evaluation system exists There is provided testing tool use service overall process in, using SSL/TLS, HTTPS, OpenVPN, IPSecVPN technology provide with Secure communication between user;Plug-in unit needed for assessment is stored in assessment knowledge data base, and the application container of starting also needs root According to the selected plug-in unit of user, corresponding tool insert is loaded from assessment knowledge data base;
Evaluation system selects corresponding evaluation tool mirror image from mirror image management, loads it and operates to application container, is user The service of SaaS mode is provided;As by assessment environment network bandwidth or safety/management strategy limit, cannot achieve from cloud to The lasting network connection of tested industrial control system, user also may be selected to dispose in advance in tested industrial control system environment Preposition assessment host, assessment host are that server or other special equipments download to application container before assessment starts User is operated on assessment host, and assessment service is provided.
6. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step four In, the evaluation tool application container for working in cloud can be used to test and assess for user, it specifically includes:
(1) security evaluation tool of the application based on IEC 62443 carries out the risk of system to the general safety of industrial control system Assessment;
(2) application configuration tool of secure examining sets the subsystem in industrial control system, various host computers and its application, network The baseline whether standby, field control equipment configuration reaches current predefined security configuration carries out automation inspection;
(3) robustness safe test tool is applied, the safety for carrying out system to industrial control equipment, application or even system is surveyed Examination identifies concurrently existing existing security breaches.
7. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step five In, user from cloud downloading target industrial control system is tested, assess as a result, specifically including, risk assessment, analysis Report and optional but be not limited to, corresponding risk resolution is suggested;The report of system configuration safety inspection result, emphasis are listed in Unsafe configuration for finding in assessment and optional but be not limited to, provides corresponding improvements in security suggestion;Robustness is surveyed safely The security breaches that find in examination and optional but be not limited to, network flow file and script needed for reappearing these loopholes can be held Line program.
8. a kind of comprehensive industry control security evaluation method according to claim 2, it is characterised in that: in the step six In, after assessment, evaluation system of the present invention closes the application container of user's application, the charging mould selected according to user Expense is included in user account by the accounting management component of formula, calling system.
CN201811563751.9A 2018-12-20 2018-12-20 A kind of comprehensive industry control security evaluation System and method for Pending CN109587159A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811563751.9A CN109587159A (en) 2018-12-20 2018-12-20 A kind of comprehensive industry control security evaluation System and method for

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811563751.9A CN109587159A (en) 2018-12-20 2018-12-20 A kind of comprehensive industry control security evaluation System and method for

Publications (1)

Publication Number Publication Date
CN109587159A true CN109587159A (en) 2019-04-05

Family

ID=65930277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811563751.9A Pending CN109587159A (en) 2018-12-20 2018-12-20 A kind of comprehensive industry control security evaluation System and method for

Country Status (1)

Country Link
CN (1) CN109587159A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104336A (en) * 2019-12-30 2020-05-05 武汉烽火信息集成技术有限公司 Online service interface testing method and device based on container and VNC
CN111431746A (en) * 2020-03-20 2020-07-17 杭州有赞科技有限公司 API gateway migration method and system
CN111835592A (en) * 2020-07-14 2020-10-27 北京百度网讯科技有限公司 Method, apparatus, electronic device and readable storage medium for determining robustness
CN112132318A (en) * 2020-08-21 2020-12-25 成都飞机工业(集团)有限责任公司 Design change implementation monitoring management system and management method
CN112286906A (en) * 2020-10-24 2021-01-29 曹青青 Information security processing method based on block chain and cloud computing center

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160182309A1 (en) * 2014-12-22 2016-06-23 Rockwell Automation Technologies, Inc. Cloud-based emulation and modeling for automation systems
CN106406929A (en) * 2016-08-25 2017-02-15 成都交大光芒科技股份有限公司 Implementation method of distributed informatization application integration platform application plug-in container
CN108406764A (en) * 2018-02-02 2018-08-17 上海大学 Intelligence style of opening service robot operating system and method
CN108616400A (en) * 2018-05-09 2018-10-02 国家计算机网络与信息安全管理中心 A kind of fragility inspection method and device for industrial control system
CN108737410A (en) * 2018-05-14 2018-11-02 辽宁大学 A kind of feature based is associated limited to know industrial communication protocol anomaly detection method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160182309A1 (en) * 2014-12-22 2016-06-23 Rockwell Automation Technologies, Inc. Cloud-based emulation and modeling for automation systems
CN106406929A (en) * 2016-08-25 2017-02-15 成都交大光芒科技股份有限公司 Implementation method of distributed informatization application integration platform application plug-in container
CN108406764A (en) * 2018-02-02 2018-08-17 上海大学 Intelligence style of opening service robot operating system and method
CN108616400A (en) * 2018-05-09 2018-10-02 国家计算机网络与信息安全管理中心 A kind of fragility inspection method and device for industrial control system
CN108737410A (en) * 2018-05-14 2018-11-02 辽宁大学 A kind of feature based is associated limited to know industrial communication protocol anomaly detection method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104336A (en) * 2019-12-30 2020-05-05 武汉烽火信息集成技术有限公司 Online service interface testing method and device based on container and VNC
CN111431746A (en) * 2020-03-20 2020-07-17 杭州有赞科技有限公司 API gateway migration method and system
CN111431746B (en) * 2020-03-20 2022-05-31 杭州有赞科技有限公司 API gateway migration method and system
CN111835592A (en) * 2020-07-14 2020-10-27 北京百度网讯科技有限公司 Method, apparatus, electronic device and readable storage medium for determining robustness
CN111835592B (en) * 2020-07-14 2022-09-27 北京百度网讯科技有限公司 Method, apparatus, electronic device and readable storage medium for determining robustness
CN112132318A (en) * 2020-08-21 2020-12-25 成都飞机工业(集团)有限责任公司 Design change implementation monitoring management system and management method
CN112132318B (en) * 2020-08-21 2022-01-25 成都飞机工业(集团)有限责任公司 Design change implementation monitoring management system and management method
CN112286906A (en) * 2020-10-24 2021-01-29 曹青青 Information security processing method based on block chain and cloud computing center

Similar Documents

Publication Publication Date Title
CN109587159A (en) A kind of comprehensive industry control security evaluation System and method for
Awad et al. Tools, techniques, and methodologies: A survey of digital forensics for scada systems
CN113704767A (en) Vulnerability scanning engine and vulnerability worksheet management fused vulnerability management system
Ulltveit-Moe et al. Secure information sharing in an industrial Internet of Things
Stojanović et al. SCADA systems in the cloud and fog environments: Migration scenarios and security issues
CN116055254A (en) Safe and trusted gateway system, control method, medium, equipment and terminal
Zhu et al. Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
Ten et al. Cybersecurity for electric power control and automation systems
Maynard et al. Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
Ahn et al. Blockchain-enabled security module for transforming conventional inverters toward firmware security-enhanced smart inverters
Grandgenett et al. Authentication bypass and remote escalated I/O command attacks
Cagalaban et al. Improving SCADA control systems security with software vulnerability analysis
Ganguly et al. Analysis of the security anomalies in the smart metering infrastructure and its impact on energy profiling and measurement
CN110808848A (en) Power data network security test method
Tzokatziou et al. Exploiting SCADA vulnerabilities using a human interface device
Rencelj Ling et al. Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
Whyte Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems
Moore Penetration testing and metasploit
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Sabnis et al. Intrinsically secure next-generation networks
Demblewski Security frameworks for machine-to-machine devices and networks
Kalhara et al. Comprehensive Security Solution for an Industry 4.0 Garment Manufacturing System
Wu et al. Testing and evaluation of the mimic defense principle verification system
Stamp et al. Cyber Security Gap Analysis for Critical Energy Systems (CSGACES).
Xenofontos Security Attacks in Programmable Logic Controllers (PLCs) in Industrial Control Systems (ICS)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190405

WD01 Invention patent application deemed withdrawn after publication