ICONICS Utilizes Bedrock Automation Root of Trust

02.3.2018

ICONICS has announced an authentication method of its GENESIS64™ HMI/SCADA and building automation software suite via a control system root of trust provided through Bedrock Automation, based in San Jose, California.

 

ICONICS-maintworld image

ICONICS developers will be able to generate Certificate Signing Requests (CSRs) to be signed by the Bedrock Certificate Authority (CA). These electronic certificates provide users with signed and encrypted communication between their Bedrock control system and their HMI and SCADA applications.

-Security is a top priority for most automation customers today, said Russ Agrusa, President and CEO of ICONICS.

-ICONICS has partnered with Bedrock Automation to provide an end-to-end connected solution for IoT and Industry 4.0 that ensures safe, secure information exchange between PLCs and a variety of enterprise information systems.

Real-time enterprise information management

ICONICS GENESIS64 is an application development platform for real-time enterprise information management. It provides a complete set of modules via a unified engineering user interface built on Microsoft.NET and sharable with other open applications via OPC UA. GENESIS64 users building control logic for critical infrastructure industries, such as water treatment, power & utilities, oil & gas, and more, can now incorporate the Bedrock encryption keys directly into their applications and enjoy end-to-end cyber secure protection.

In a typical protected architecture, an end user might deploy a Bedrock OSA as a PLC to control field devices such as pumps, valves and sensors. An ICONICS end user requiring secure data exchange with the controller would request a certificate from the Bedrock CA. After verifying identity, the Bedrock CA provides a certificate that allows the ICONICS application to access data from the Bedrock PLC. This also provides a root of trust against which the developer can secure communications between ICONICS servers, as well as with web and mobile communications.

-Once this open, yet secure, relationship is established, said Albert Rooyakkers, CEO and Founder of Bedrock Automation.

Bedrock enables cyber security by starting with a secure supply chain, using verified electronic circuits it builds itself. It then draws on the power and flexibility of public key infrastructure (PKI) and Transport Layer Security (TLS) technologies that is similar to what is used to secure online financial transactions and critical military and aerospace controls.

www.iconics.com

Previous
Home
Category
Next