What does "security" mean?
Security in a typical automation environment
Data theft
Unauthorized access to data
Data modification (hacker)
System failure
Unclear identity during access
Programming interface (CDS) including remote maintenance
PLC, operation + monitoring
Real-time communication between controllers
Fieldbus interfaces
General requirements for a "protected environment"
This ensures a protected environment in addition to the resources available in CODESYS:
Use of virus protection; strict password rules; firewall; separation of office, production and fieldbus networks; use of encrypted and authenticated protocols (VPN) for communication between networks; strict control when using data storage devices; mechanical access protection for controllers
Security in CODESYS
For an overview, also see the following section on our website: CODESYS SECURITY
For general information about the topic of security, see the help: Basic information
The security functions which are integrated into the CODESYS products are constantly updated and expanded. All CODESYS software components are regularly checked for potential security vulnerabilities. In addition, the CODESYS Group is committed to resolve verified security vulnerabilities within a reasonable period of time. In our Security Whitepaper
(PDF), you will find all important information about CODESYS Security.
An important part of the security measures is the use of certificates for the encryption of source code, boot application, packages, and above all communication between CODESYS Development System and the PLC. The use of X.509 certificates is supported for this.
What is protected and where? | What is protected against and how? | "Resources" |
---|---|---|
Package | Protection against non-integrated installations: |
|
CODESYS programming system Project (source code) | Protection against unauthorized access (read access and/or write access) to the project; ensure identity integrity:
Ensure installation integrity: See above under Package |
|
Runtime System CODESYS Control for <device> SL Communication with the PLC | Protection against unauthorized data access (read access and/or write access) and actions on the PLC: Protection against data loss due to system failure: |
|
Use of the CODESYS Visualization CODESYS WebVisu | Protection against unauthorized access to data/values and actions (operability) in Visu online mode: | Security Screen (certificate for web server) Visualization Manager: User management Visu Visualization Element Repository for signing elements |
Use of the CODESYS Automation Server | Protection against unauthorized access to data/values and actions (operability) in CAS online mode::
| Quick Setup to set up encrypted communication between edge gateway and controller |
Communication via CODESYS OPC UA | Protection against unwanted data access when exchanging data via the OPC UA Server:
Protection against unauthorized symbolic access to PLC variables:
| Secure OPC UA Server, security in accordance with the OPC UA specification:
|
Project repository in CODESYS Git | Protection against unauthorized access to data managed in Git:
| Dialogs in CODESYS Git Dialog: Options – Git in CODESYS Development System |
Project repository in CODESYS SVN | Protection against unauthorized access to data managed in SVN:
| Dialogs in CODESYS SVN Dialog: Options – SVN in CODESYS Development System |