Why leaving easy remote asses is a bad idea

Very interesting article - definitely gives one a lot to think about!

Although the ultimate responsibility for implementing security measures belongs of course to the end user, I've been thinking that manufacturers of internet-attached devices could help by shipping each unit with a unique random password, printed on a removable, scratch-off label attached to the device.
 
Easy remote asses? Seriously, no one has commented on that.

I have always found easy remote asses to be useful, fun and exciting but very dangerous. Really need to be careful with the hidden back doors. Leaving the easy remote asses for local asses is never easy to do.

Ok, that's all I've got!

OG
 
Very interesting article - definitely gives one a lot to think about!

Although the ultimate responsibility for implementing security measures belongs of course to the end user, I've been thinking that manufacturers of internet-attached devices could help by shipping each unit with a unique random password, printed on a removable, scratch-off label attached to the device.

Thats a silly thing to expect of the manufacturer. Keeping the same default username and password is a good idea, because factory resetting can revert back to that username and password, and its on less chunk of code to reside on an embedded device. If the installer cant remember to change a default password, they should not be working that job. Just like integrators who leave unsecured PLCs accessible via web should be fired.
 
Adapt

As with everything in the automation and controls world security has to evolve as other technology evolves. We all know that security was not a concern with a lot of systems that were installed as little as 10 years ago because the devices weren't a target. It is obvious now that there has to be a secure network for industrial controls but it hasn't always been the case.

This is a wake up call that everyone needs to respond to and adapt their systems to prevent security breaches. The way I see it, this is just an opportunity for work. As was noted there are countless number of companies that have no clue how vulnerable they may be and they need to have support and guidance with improving their industrial networks. Even with IT support there could still be weaknesses that can be improved.

I think this is a great opportunity to learn, adapt and improve!
 
Thats a silly thing to expect of the manufacturer. Keeping the same default username and password is a good idea, because factory resetting can revert back to that username and password, and its on less chunk of code to reside on an embedded device. If the installer cant remember to change a default password, they should not be working that job. Just like integrators who leave unsecured PLCs accessible via web should be fired.

I fully agree that implementing security features is the integrator's and, ultimately, the end-user's responsibility. But I still think that shipping each device with a unique password would provide a valuable layer of security. And the capability of resetting to a common default password, limited to people having physical access to the device (e.g. pressing a RESET button), could still be provided.
 

Similar Topics

I'm currently on a research project where I can send tag read & write requests to both SLC as well as CLX controllers. Presently, there's no...
Replies
8
Views
2,413
Hello, We have 5 floating licenses for Studio 5000. Despite training people to disconnect from the PLC and close the software, we still have...
Replies
6
Views
2,692
Hi guys .. So I need help on an issue tank. In automatic mode, I want to fill a silo A. so, the Motors start in this order M110, M109L, M108, ...
Replies
22
Views
4,939
See picture. I want to add a rung (magenta) into the existing code. Can't figure out how to do this. I select a -||- , right? When I drag/drop...
Replies
21
Views
1,793
Hi All, On my site, the standard template for storing recipes in the PLC is to create a tag called PartRecipe which is an 2D array - for example...
Replies
4
Views
1,471
Back
Top Bottom