日本公妇在线观看中文版-精品亚洲成a人片在线观看-水蜜桃av无码-最近免费中文字幕大全高清10

山東耀智Lighthouse指定代理商,主營:塵埃粒子計數(shù)器,浮游菌采樣器等產(chǎn)品

網(wǎng)站首頁 > 新聞資訊 > 行業(yè)資訊

【深度好文】生產(chǎn)設備PLC/HMI/SCADA的數(shù)據(jù)完整性風險!

2019-08-08 15:45:19 山東耀智信息科技有限公司 閱讀


產(chǎn)設備PLC/HMI/SCADA的數(shù)據(jù)完整性風險!

允咨GMP 

微信號 YOUTH20171219

功能介 上海允咨醫(yī)科技有限公司是一家服于醫(yī)業(yè)GxP一站式培中心,旨在業(yè)一批具有實戰(zhàn)管理經(jīng)驗的高端制質(zhì)量管理人才。

文章轉(zhuǎn)載自公眾號 GMP公室  作者 譯組 

 

GMP內(nèi)常的生產(chǎn)與工程的設備算機化系統(tǒng)大多以PLCProgram Logic Controller 邏輯控制器),HMI Human Machine Interface 人機交互界面-觸摸屏),SCADA Supervisory Control And Data Acquisition即數(shù)據(jù)采集與監(jiān)視控制系統(tǒng))三形式存在;例如自動壓片機,干機,包衣機,水制分配及監(jiān)控系統(tǒng)環(huán)監(jiān)測統(tǒng)。

 

相比于先前數(shù)據(jù)完整性暴中心QC實驗室,生產(chǎn)和工程的算機化系統(tǒng)普遍存在著:統(tǒng)老舊(如仍使用Windows XP),機版系統(tǒng)多,流程中部件元多,無數(shù)據(jù)份和詳細審計追蹤,限隔離不清,數(shù)據(jù)配置可被非法修改除等問題

 

檢查缺陷

 

2018524簽發(fā)FDA 483FEI  3008565058)中就提及了生產(chǎn)設備數(shù)據(jù)完整性相的缺陷:

圖片2.png 

 

檢查發(fā)現(xiàn),針對數(shù)據(jù)完整性:  

 

(公司內(nèi))算機化系統(tǒng)缺乏合適的管控手段來確保生產(chǎn)和控制的主數(shù)據(jù)和記錄master production and control records僅僅被授人士來修改。

指出,公司的生產(chǎn)設備不符合21 CFR Part 11  

a. 現(xiàn)階段,XX機版生產(chǎn)設備未能配置合適的HMI/PLC/SCADA統(tǒng),因此它缺少帶時間戳的審計追蹤,數(shù)據(jù)管理,警管理,記錄歸檔與恢等功能;  

b. 現(xiàn)階段,XX機版設備有內(nèi)置的HMI,但是HMI缺少帶時間戳的審計追蹤,數(shù)據(jù)管理,警管理,記錄歸檔與恢等功能;  

c. 現(xiàn)階段,XX機版設備有內(nèi)置的SCADA,但是SCADA缺少帶時間戳的審計追蹤,數(shù)據(jù)管理,警管理,記錄歸檔與恢等功能;設備僅僅可以打印針對CPP關鍵過程參數(shù))的實時審計追蹤告用以核填寫BMR(批次生產(chǎn)記錄。

 

PDA期刊:SCADA統(tǒng)的數(shù)據(jù)完整性風險

 

PDA期刊中刊登了SCADA統(tǒng)的數(shù)據(jù)完整性風險

 

 

Data Integrity Risks on SCADA Systems

SCADA統(tǒng)數(shù)據(jù)完整性性風險

 

SCADA (Supervisory Control and Data Acquisition) software vendors have historically served industries that require tight controls over system configurations and data records. As a result, modern SCADA software systems have evolved to provide a robust set of tools intrinsically designed to prevent the intentional or unintentional undetectable alteration of system data. Most notably, the integration of electronic record management, electronic signatures, logical security, and audit trail functions are built-in or made available as optional features to provide compliance with FDA 21 CFR Part 11. However, there are several considerations and controls that are worth looking at regarding data integrity.

SCADA(監(jiān)測控制和數(shù)據(jù)采集)件供來服于各個需要格控制系統(tǒng)配置和數(shù)據(jù)記錄的行業(yè)。因此,現(xiàn)SCADA件系統(tǒng)經(jīng)發(fā)展到能提供一套大的工具,其內(nèi)在設計可以防止系統(tǒng)數(shù)據(jù)有意或無意的不可檢測的更改。最得注意的是,記錄管理、名、邏輯安全和審計追蹤功能的集成是內(nèi)置的,或作功能,以提供符合 FDA 21 CFR Part 11 的法規(guī)。但是,在數(shù)據(jù)完整性方面有幾個注意事和控制措施注。

 

The front line defense is, of course, the security of the process network. Physical security of all network components should be considered in the design of the system. Production facilities, system servers, network switches, PLCs, IO modules, process instrumentation, and where possible, production workstation terminals should be kept under lock-and-key with access limited to as few individuals as necessary to operate and maintain the network hardware systems. Logical security should be limited to a documented list of authorized individuals, with clearly delineated permissions limiting their access to only those system functions commensurate to their level of responsibility and qualification to access or generate data on the system.

當然,前防御是流程網(wǎng)的安全性。在系統(tǒng)設計所有網(wǎng)絡組件的物理安全性。生產(chǎn)設施、系統(tǒng)器、網(wǎng)機、PLCIO表,和生產(chǎn)工作站端(如有)妥善保管,并且訪問僅限于需要網(wǎng)硬件系統(tǒng)進行操作和維護的人。邏輯安全限于經(jīng)批準的人,并有正式清,明確劃分限限制其訪問權限于與其訪問或生成的級別格相稱的系統(tǒng)功能系統(tǒng)上的數(shù)據(jù)。

 

Clear guidelines for establishing security for a SCADA system are provided in the National Institute of Standards and Technology, Special Publication 800-82, Guide to Industrial Control Systems (ICS) Security (Rev.2, May 2015,https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf). The document addresses security risks for Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC).

美國準與技研究所SCADA統(tǒng)安全性的提供了明確的指南, 出版800-82,工業(yè)控制系統(tǒng) (ICS)安全指南(20155月第2,https://nvlpubs.nist.gov/nistpubs/NIST/NIST.SP.800-82r2.pdf)。指南包括監(jiān)測控制和數(shù)據(jù)采集(SCADA)統(tǒng)、分布式控制系統(tǒng)(DCS)和其他控制系統(tǒng)配置(如可邏輯控制器((PLC))的安全風險

 

The Executive Summary of the Guide document offers examples of the types of possible incidents that might occur as a result of data security breaches or a lack of adequate data security on an industrial control system:

《指南》文件明了由于數(shù)據(jù)安全漏洞或工業(yè)控制系統(tǒng)缺乏足的數(shù)據(jù)安全而可能發(fā)生的事件:

· Blocked or delayed flow of information through ICS networks, which could disrupt ICS operation.

阻止或延ICS 網(wǎng)上的信息流,可能ICS運行中斷。

· Unauthorized changes to instructions, commands, or alarm thresholds, which could damage, disable, or shut down equipment, create environmental impacts, and/or endanger human life.

指令、命令或的未經(jīng)的更改,可能會壞、或使設備失效或停止,造成環(huán)境影響和/或危及人的生命。

· Inaccurate information sent to system operators, either to disguise unauthorized changes, or to cause the operators to initiate inappropriate actions, which could have various negative effects.

發(fā)統(tǒng)操作的不準確信息,致未經(jīng)的更改被掩蓋,或致操作采取不恰當?shù)男?/span>,可能會產(chǎn)生各種負面影響。

· ICS software or configuration settings modified, or ICS software infected with malware, which could have various negative effects.

ICS 件或配置置被修改,或 ICS 件感染件,可能會產(chǎn)生各種負面影響。

· Interference with the operation of equipment protection systems, which could endanger costly and difficult-to-replace equipment.

設備統(tǒng)運行受到干,可能危及昂以更設備。

· Interference with the operation of safety systems, which could endanger human life.

安全系統(tǒng)運行,可能危及人的生命。

 

Notably, the Executive Summary does not highlight the potential loss, adulteration, or alteration to process data history stored in a SCADA database. This risk is, however, addressed extensively throughout the document.

得注意的是,指南沒有強調(diào) SCADA 數(shù)據(jù)中的工數(shù)據(jù)史的潛在失、假或更改。但是,在整個文件中廣泛討論風險

 

The Executive Summary of the Guide document highlights the major security objectives for an ICS:

《指南》強調(diào)ICS的主要安全目

 

· Restricting logical access to the ICS network and network activity.

限制 ICS 網(wǎng)和網(wǎng)邏輯訪問。

· Restricting physical access to the ICS network and devices.

限制 ICS 網(wǎng)設備的物理訪問。

· Protecting individual ICS components from exploitation.

ICS 件免受攻。

· Restricting unauthorized modification of data.

限制未經(jīng)的數(shù)據(jù)修改。

· Detecting security events and incidents.

檢測安全事件和事故。

· Maintaining functionality during adverse conditions.

劣條件下保持功能。

· Restoring the system after an incident.

發(fā)生事故后原系統(tǒng)

 

In a typical ICS this means a defense-in-depth strategy that includes:

在典型的 ICS 中,意味著深度防御戰(zhàn)略,其中包括:

 

· Developing security policies, procedures, training and educational material that applies specifically to the ICS.

制定適用于 ICS 的安全政策、程序、培和教育材料。

· Considering ICS security policies and procedures based on the Homeland Security Advisory System Threat Level, deploying increasingly heightened security postures as the Threat Level increases.

根據(jù)國土安全咨統(tǒng)脅級別,考 ICS 的安全政策和程序,威脅級別越高,安全態(tài)勢格。

· Addressing security throughout the lifecycle of the ICS from architecture design to procurement, to installation to maintenance to decommissioning.

解決 ICS 從架構設計到采、安裝、維護、退役整個生命周期的安全問題。

· Implementing a network topology for the ICS that has multiple layers, with the most critical communications occurring in the most secure and reliable layer.

具有多個 ICS 實現(xiàn)網(wǎng)拓撲,最關鍵的通信發(fā)生在最安全可靠的中。

· Providing logical separation between the corporate and ICS networks (e.g., stateful inspection firewall(s) between the networks, unidirectional gateways).

提供公司網(wǎng) ICS 網(wǎng)邏輯分離(例如,網(wǎng)、向網(wǎng)的有狀態(tài)檢查防火)。

· Employing a DMZ network architecture (i.e., prevent direct traffic between the corporate and ICS networks).

使用 DMZ 網(wǎng)體系結(jié)(即防止公司網(wǎng) ICS 網(wǎng)的直接交互)

· Ensuring that critical components are redundant and are on redundant networks.

確保關鍵組件是冗余的,并且位于冗余網(wǎng)上。

· Designing critical systems for graceful degradation (fault tolerant) to prevent catastrophic cascading events.

設計用于功能故障()關鍵統(tǒng),以防止災級聯(lián)事件。

· Disabling unused ports and services on ICS devices after testing to assure this will not impact ICS operation.

測試后禁用 ICS 設備上未使用的端口和服,以確保不會影響 ICS 操作。

· Restricting physical access to the ICS network and devices.

限制 ICS 網(wǎng)設備的物理訪問

· Restricting ICS user privileges to only those that are required to perform each person’s job (i.e., establishing role-based access control and configuring each role based on the principle of least privilege).

 ICS 戶權限限制為僅執(zhí)行個人工作所需的(即建立基于角色的訪問控制和基于限最小化原配置個角色)。

· Using separate authentication mechanisms and credentials for users of the ICS network and the corporate network (i.e., ICS network accounts do not use corporate network user accounts).

 ICS 網(wǎng)使用獨立于公司網(wǎng)的用身份驗證機制和憑據(jù)( ICS 網(wǎng)絡帳戶不使用公司網(wǎng)戶帳戶)。

· Using modern technology, such as smart cards for Personal Identity Verification (PIV).

使用現(xiàn)代技,如用于個人身份驗證 (PIV) 的智能卡。

· Implementing security controls such as intrusion detection software, antivirus software and file integrity checking software, where technically feasible, to prevent, deter, detect, and mitigate the introduction, exposure, and propagation of malicious software to, within, and from the ICS.

施安全控制,如入侵檢測軟件、防病毒件和文件完整性檢查軟(如果技上可行),以防止、阻止、檢測和減輕惡件的入侵、暴露和播。

· Applying security techniques such as encryption and/or cryptographic hashes to ICS data storage and communications where determined appropriate.

將加密和/或加密哈希等安全技術應用于 ICS 數(shù)據(jù)存和通信(如果確定適當)。

· Expeditiously deploying security patches after testing all patches under field conditions on a test system if possible, before installation on the ICS.

如有可能,在測試環(huán)境下測試所有丁后,在 安裝至ICS 之前盡快部署安全丁。

· Tracking and monitoring audit trails on critical areas of the ICS.

跟蹤和監(jiān)測 ICS 關鍵區(qū)域的審計追蹤。

· Employing reliable and secure network protocols and services where feasible.

在可行的情況下使用可靠和安全的網(wǎng)絡協(xié)議和服。

 

典型的PLC/HMI/SCADA – 統(tǒng)架構

 

圖片3.png 

 

 

典型的PLC/HMI/SCADA – 數(shù)據(jù)流

 

圖片4.png 

2. 典型自化生產(chǎn)工程系統(tǒng)的數(shù)據(jù)流示意[1]

 

結(jié)12,在典型的自化生產(chǎn)和工程系統(tǒng)中:

數(shù)據(jù)流是:設備續(xù)運行→PLC采集于設備→PLC數(shù)據(jù)→ HMI機版)短數(shù)據(jù)→ SCADA(集成版)存數(shù)據(jù)

 

21 CFR Part  211.68(b)  EU Annex 11 p5 都明確要求:確保數(shù)據(jù)完整性,算機化系統(tǒng)的數(shù)據(jù),記錄或者其他信息,其入和出都必需檢查其準確性。  ′為滿足上述期望,(企業(yè))需要定期驗證認計算機化系統(tǒng)硬件以及接口,來確保直接來源設備的數(shù)據(jù)的準確性和可靠性(TGA,Code of GMP,2013)。

 

典型的PLC/HMI/SCADA – 數(shù)據(jù)管控措施

 

如下2所示,確保數(shù)據(jù)完整性,在整個數(shù)據(jù)流程:

1. 首先,需要受管控(如前文提到的帶時間戳的審計追蹤)的CGMP 子數(shù)據(jù)是指數(shù)據(jù)最保存時間必需是執(zhí)CGMP操作同一時間Data Integrity – ALCOA Contemporaneous性要求);所以PLC Transient Data不是,而SCADASaved Data 在是CGMP子數(shù)據(jù)(21 CFR 211.100b))。

2. SCADA上存CGMP子數(shù)據(jù)完整性需要帶時間戳的審計追蹤,數(shù)據(jù)管理,警管理,記錄歸檔與恢等數(shù)據(jù)管控措施( EU Annex 11 )。 

3. PLCHMI上的臨時數(shù)據(jù)完整性基于IT礎設施確GAMP5IT Infrastructure qualification,設備,I/O準確性測試EU Annex 15.  

 

的措施

 

純設備or外加自控PLC

1.啟用前設備,生產(chǎn)中參數(shù)有記錄,任何修改有流程控制

2.周期性校驗傳感器和參數(shù)

3.Time Stamp - 產(chǎn)區(qū)時鐘,定期校,操作寫批次記錄時實時記錄

 

設備+PLC+HMI(最數(shù)據(jù)存

1.HMI 數(shù)據(jù)CGMP E-data;需算機化系統(tǒng)驗證 功能包括如用管理,限隔離,帶時間戳的審計追蹤,數(shù)據(jù)管理,產(chǎn)告,警管理,記錄歸檔與恢

2.如果受限于性能,上述審計追蹤,數(shù)據(jù)份,限功能實現(xiàn)不了,臨時措施可以以流程控制-操作日志本+紙質(zhì)報+字,期來看,重要設備需要做CSV改造(MES or SCADA)。

 

設備+PLC+HMI機)+SCADA(集成)

SCADA數(shù)據(jù)CGMP E-data;需算機化系統(tǒng)驗證 功能包括如用管理,限隔離,帶時間戳的審計追蹤,數(shù)據(jù)管理,產(chǎn)告,警管理,記錄歸檔與恢

 

聲明:上述內(nèi)容供交流學使用,文中述、點判斷保持中立,不所包含內(nèi)容的準確性、可靠性或完整性提供任何明示或暗示的保。作參考,并各位自行承擔全部任。版權歸原作者所有,如遇版權問題請聯(lián)系小編刪除。