www.欧美成人-www.欧美激情-www.欧美精品-www.欧美日本免费视频-www.欧美视频-www.啪啪.com

山東耀智Lighthouse指定代理商,主營:塵埃粒子計數器,浮游菌采樣器等產品

網站首頁 > 新聞資訊 > 行業資訊

【深度好文】生產設備PLC/HMI/SCADA的數據完整性風險!

2019-08-08 15:45:19 山東耀智信息科技有限公司 閱讀


產設備PLC/HMI/SCADA的數據完整性風險

允咨GMP 

微信號 YOUTH20171219

功能介 上海允咨醫科技有限公司是一家服于醫GxP一站式培中心,旨在一批具有實戰管理經驗的高端制量管理人才。

文章轉載自公眾號 GMP公室  作者 譯組 

 

GMP內常的生與工程的設備算機化系大多以PLCProgram Logic Controller 邏輯控制器),HMI Human Machine Interface 人機交互界面-觸摸屏),SCADA Supervisory Control And Data Acquisition即數據采集與監視控制系)三形式存在;例如自動壓片機,干機,包衣機,水制分配及控系監測

 

相比于先前數據完整性暴中心QC實驗室,生和工程的算機化系普遍存在著:老舊(如仍使用Windows XP),機版系多,流程中部件元多,無數據份和詳細審計追蹤,限隔離不清,數據配置可被非法修改除等問題

 

檢查缺陷

 

2018524簽發FDA 483FEI  3008565058)中就提及了生產設備數據完整性相的缺陷:

圖片2.png 

 

檢查發現針對數據完整性:  

 

(公司內)算機化系缺乏合適的管控手段來確保生和控制的主數據和記錄master production and control records僅僅被授人士來修改

指出,公司的生產設備不符合21 CFR Part 11  

a. 現階段,XX機版生產設備未能配置合適的HMI/PLC/SCADA,因此它缺少帶時間戳的審計追蹤,數據管理,警管理,記錄歸檔與恢等功能  

b. 現階段,XX機版設備有內置的HMI,但是HMI缺少帶時間戳的審計追蹤,數據管理,警管理,記錄歸檔與恢等功能  

c. 現階段,XX機版設備有內置的SCADA,但是SCADA缺少帶時間戳的審計追蹤,數據管理,警管理,記錄歸檔與恢等功能;設備僅僅可以打印針對CPP關鍵過程參數)的實時審計追蹤告用以核填寫BMR(批次生產記錄

 

PDA期刊:SCADA的數據完整性風險

 

PDA期刊中刊登了SCADA的數據完整性風險

 

 

Data Integrity Risks on SCADA Systems

SCADA數據完整性性風險

 

SCADA (Supervisory Control and Data Acquisition) software vendors have historically served industries that require tight controls over system configurations and data records. As a result, modern SCADA software systems have evolved to provide a robust set of tools intrinsically designed to prevent the intentional or unintentional undetectable alteration of system data. Most notably, the integration of electronic record management, electronic signatures, logical security, and audit trail functions are built-in or made available as optional features to provide compliance with FDA 21 CFR Part 11. However, there are several considerations and controls that are worth looking at regarding data integrity.

SCADA(監測控制和數據采集)件供來服于各個需要格控制系配置和數據記錄的行。因此,SCADA件系經發展到能提供一套大的工具,其內在設計可以防止系數據有意或無意的不可檢測的更改。最得注意的是,記錄管理、名、邏輯安全和審計追蹤功能的集成是內置的,或作功能,以提供符合 FDA 21 CFR Part 11 的法。但是,在數據完整性方面有幾個注意事和控制措施注。

 

The front line defense is, of course, the security of the process network. Physical security of all network components should be considered in the design of the system. Production facilities, system servers, network switches, PLCs, IO modules, process instrumentation, and where possible, production workstation terminals should be kept under lock-and-key with access limited to as few individuals as necessary to operate and maintain the network hardware systems. Logical security should be limited to a documented list of authorized individuals, with clearly delineated permissions limiting their access to only those system functions commensurate to their level of responsibility and qualification to access or generate data on the system.

當然,前防御是流程網的安全性。在系統設計所有網絡組件的物理安全性。生產設施、系器、網機、PLCIO表,和生工作站端(如有)妥善保管,并且訪問僅限于需要硬件系統進行操作和維護的人邏輯安全限于批準的人,并有正式清,明確劃分限限制其訪問權限于與其訪問或生成的級別格相稱的系功能系上的數據。

 

Clear guidelines for establishing security for a SCADA system are provided in the National Institute of Standards and Technology, Special Publication 800-82, Guide to Industrial Control Systems (ICS) Security (Rev.2, May 2015,https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf). The document addresses security risks for Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC).

美國準與技研究所SCADA安全性的提供了明確的指南, 出版800-82,工控制系 (ICS)安全指南(20155月第2,https://nvlpubs.nist.gov/nistpubs/NIST/NIST.SP.800-82r2.pdf)指南包括監測控制和數據采集(SCADA)、分布式控制系(DCS)和其他控制系配置(如可邏輯控制器((PLC))的安全風險

 

The Executive Summary of the Guide document offers examples of the types of possible incidents that might occur as a result of data security breaches or a lack of adequate data security on an industrial control system:

《指南》文件明了由于數據安全漏洞或工控制系缺乏足的數據安全而可能生的事件:

· Blocked or delayed flow of information through ICS networks, which could disrupt ICS operation.

阻止或延ICS 上的信息流,可能ICS運行中斷。

· Unauthorized changes to instructions, commands, or alarm thresholds, which could damage, disable, or shut down equipment, create environmental impacts, and/or endanger human life.

指令、命令或的未的更改,可能會壞、或使設備失效或停止,造成境影響和/或危及人的生命。

· Inaccurate information sent to system operators, either to disguise unauthorized changes, or to cause the operators to initiate inappropriate actions, which could have various negative effects.

操作的不準確信息,致未的更改被掩蓋,或致操作采取不恰當的行可能會生各種負面影響。

· ICS software or configuration settings modified, or ICS software infected with malware, which could have various negative effects.

ICS 件或配置置被修改,或 ICS 件感染件,可能會生各種負面影響。

· Interference with the operation of equipment protection systems, which could endanger costly and difficult-to-replace equipment.

設備運行受到干,可能危及昂以更設備

· Interference with the operation of safety systems, which could endanger human life.

安全系運行,可能危及人的生命。

 

Notably, the Executive Summary does not highlight the potential loss, adulteration, or alteration to process data history stored in a SCADA database. This risk is, however, addressed extensively throughout the document.

得注意的是,指南沒有強調 SCADA 數據中的工數據史的潛在失、假或更改。但是,在整個文件中廣泛討論風險

 

The Executive Summary of the Guide document highlights the major security objectives for an ICS:

《指南》強調ICS的主要安全目

 

· Restricting logical access to the ICS network and network activity.

限制 ICS 和網邏輯訪問

· Restricting physical access to the ICS network and devices.

限制 ICS 設備的物理訪問

· Protecting individual ICS components from exploitation.

ICS 件免受攻

· Restricting unauthorized modification of data.

限制未的數據修改。

· Detecting security events and incidents.

檢測安全事件和事故。

· Maintaining functionality during adverse conditions.

劣條件下保持功能。

· Restoring the system after an incident.

生事故后原系

 

In a typical ICS this means a defense-in-depth strategy that includes:

在典型的 ICS 中,意味著深度防御略,其中包括:

 

· Developing security policies, procedures, training and educational material that applies specifically to the ICS.

制定適用于 ICS 的安全政策、程序、培和教育材料。

· Considering ICS security policies and procedures based on the Homeland Security Advisory System Threat Level, deploying increasingly heightened security postures as the Threat Level increases.

根據國土安全咨脅級別,考 ICS 的安全政策和程序,威脅級別越高,安全態勢格。

· Addressing security throughout the lifecycle of the ICS from architecture design to procurement, to installation to maintenance to decommissioning.

解決 ICS 從架構設計到采安裝、維護、退役整個生命周期的安全問題

· Implementing a network topology for the ICS that has multiple layers, with the most critical communications occurring in the most secure and reliable layer.

具有多個 ICS 實現拓撲,最關鍵的通信生在最安全可靠的中。

· Providing logical separation between the corporate and ICS networks (e.g., stateful inspection firewall(s) between the networks, unidirectional gateways).

提供公司網 ICS 邏輯分離(例如,網向網的有狀態檢查防火)

· Employing a DMZ network architecture (i.e., prevent direct traffic between the corporate and ICS networks).

使用 DMZ 體系(即防止公司網 ICS 的直接交互)

· Ensuring that critical components are redundant and are on redundant networks.

確保關鍵組件是冗余的,并且位于冗余網上。

· Designing critical systems for graceful degradation (fault tolerant) to prevent catastrophic cascading events.

設計用于功能故障()關鍵,以防止災級聯事件。

· Disabling unused ports and services on ICS devices after testing to assure this will not impact ICS operation.

測試后禁用 ICS 設備上未使用的端口和服,以確保不會影響 ICS 操作。

· Restricting physical access to the ICS network and devices.

限制 ICS 設備的物理訪問

· Restricting ICS user privileges to only those that are required to perform each person’s job (i.e., establishing role-based access control and configuring each role based on the principle of least privilege).

 ICS 戶權限限制為僅執行個人工作所需的(即建立基于角色的訪問控制和基于限最小化原配置個角色)

· Using separate authentication mechanisms and credentials for users of the ICS network and the corporate network (i.e., ICS network accounts do not use corporate network user accounts).

 ICS 使用獨立于公司網的用身份驗證機制和憑據( ICS 絡帳戶不使用公司網戶帳戶)

· Using modern technology, such as smart cards for Personal Identity Verification (PIV).

使用代技,如用于個人身份驗證 (PIV) 的智能卡。

· Implementing security controls such as intrusion detection software, antivirus software and file integrity checking software, where technically feasible, to prevent, deter, detect, and mitigate the introduction, exposure, and propagation of malicious software to, within, and from the ICS.

施安全控制,如入侵檢測軟件、防病毒件和文件完整性檢查軟(如果技上可行),以防止、阻止、檢測和減輕惡件的入侵、暴露和播。

· Applying security techniques such as encryption and/or cryptographic hashes to ICS data storage and communications where determined appropriate.

將加密和/或加密哈希等安全技術應用于 ICS 數據存和通信(如果確定適當)

· Expeditiously deploying security patches after testing all patches under field conditions on a test system if possible, before installation on the ICS.

如有可能,在測試環境下測試所有丁后,在 安裝至ICS 之前盡快部署安全丁。

· Tracking and monitoring audit trails on critical areas of the ICS.

跟蹤和監測 ICS 關鍵區域的審計追蹤。

· Employing reliable and secure network protocols and services where feasible.

在可行的情況下使用可靠和安全的網絡協議和服

 

典型的PLC/HMI/SCADA – 架構

 

圖片3.png 

 

 

典型的PLC/HMI/SCADA – 數據流

 

圖片4.png 

2. 典型自化生工程系的數據流示意[1]

 

12,在典型的自化生和工程系中:

數據流是:設備運行→PLC采集于設備→PLC數據→ HMI機版)短數據→ SCADA(集成版)存數據

 

21 CFR Part  211.68(b)  EU Annex 11 p5 都明確要求:確保數據完整性,算機化系的數據,記錄或者其他信息,其入和出都必需檢查其準確性。  ′為滿足上述期望,(企)需要定期驗證認計算機化系硬件以及接口,來確保直接來源設備的數據的準確性和可靠性(TGACode of GMP,2013)。

 

典型的PLC/HMI/SCADA – 數據管控措施

 

如下2所示,確保數據完整性,在整個數據流程:

1. 首先,需要受管控(如前文提到的帶時間戳的審計追蹤)的CGMP 子數據是指數據最保存時間必需是CGMP操作同一時間Data Integrity – ALCOA Contemporaneous性要求);所以PLC Transient Data不是,而SCADASaved Data 在是CGMP子數據(21 CFR 211.100b))。

2. SCADA上存CGMP子數據完整性需要帶時間戳的審計追蹤,數據管理,警管理,記錄歸檔與恢等數據管控措施( EU Annex 11 )。 

3. PLCHMI上的臨時數據完整性基于IT礎設施確GAMP5IT Infrastructure qualification,設備I/O準確性測試EU Annex 15.  

 

的措施

 

純設備or外加自控PLC

1.啟用前設備,生中參數有記錄,任何修改有流程控制

2.周期性校驗傳感器和參數

3.Time Stamp - 時鐘,定期校,操作寫批次記錄時實時記錄

 

設備+PLC+HMI(最數據存

1.HMI 數據CGMP E-data;需算機化系統驗證 功能包括如用管理,限隔離,帶時間戳的審計追蹤,數據管理,告,警管理,記錄歸檔與恢

2.如果受限于性能,上述審計追蹤,數據份,限功能實現不了,臨時措施可以以流程控制-操作日志本+紙質報+字,期來看,重要設備需要做CSV改造(MES or SCADA)。

 

設備+PLC+HMI機)+SCADA(集成)

SCADA數據CGMP E-data;需算機化系統驗證 功能包括如用管理,限隔離,帶時間戳的審計追蹤,數據管理,告,警管理,記錄歸檔與恢

 

聲明:上述內容供交流學使用,文中述、點判斷保持中立,不所包含內容的準確性、可靠性或完整性提供任何明示或暗示的保作參考,并各位自行承擔全部任。版權歸原作者所有,如遇版權問題請聯系小編刪除。

 

 

 


主站蜘蛛池模板: 国产精品成人观看视频免费 | 久久免费成人 | 欧美成人交tv免费观看 | 久久a 热6| 精品国产高清不卡毛片 | 亚洲欧美日韩成人网 | 精品国产三级v | 精品国产免费久久久久久婷婷 | 亚洲春色综合另类网蜜桃 | 噜噜噜狠狠夜夜躁 | 国产精品毛片一区 | 国产成人精品免费大全 | 99久久成人国产精品免费 | 亚洲欧洲精品久久 | 欧美成人精品一区二三区在线观看 | 欧美在线资源 | 国产不卡毛片 | 亚洲一区图片 | 亚洲欧洲日本在线 | h小视频在线观看网 | 亚洲日本高清影院毛片 | 做爰成人五级在线视频 | 91福利一区二区在线观看 | 国产成人91精品 | 四色婷婷婷婷色婷婷开心网 | 精品久久久久久中文字幕欧美 | 精品a级片 | 国产精品亚洲高清一区二区 | 五月天福利视频 | 日本高清在线精品一区二区三区 | 亚洲一二区视频 | 日日射天天干 | 大香香蕉 | 国产精品高清久久久久久久 | 国产911情侣拍拍在线播放 | 日本视频播放 | 日本人写真艺术 | 美女精品永久福利在线 | 亚洲男人在线 | 国产免费jizz在线播放视频 | 久久青草91免费观看 |