BMS Cybersecurity Products and Solutions
Visione
Come leader dell’innovazione nelle soluzioni di gestione dell’energia, Distech Controls offre tecnologie di gestione degli edifici e servizi unici che ottimizzano l’efficienza energetica e il comfort negli edifici, riducendo nel contempo tutti i costi operativi. Forniamo Soluzioni Innovative per Edifici più ecologici attraverso la nostra passione per l’innovazione, la qualità, la soddisfazione del Cliente e la sostenibilità.
Physical Security
Protection of the physical assets that are hosting the data we wish to secure.
Secure Boot
ECLYPSE APEX only. Benefit from secure boot and cybersecure communication between OT, IT, and cloud-based platforms, making it the ideal all-in-one solution for local and remote applications.Authentication
- Single Sign-On (SSO) with ECY-APEX as an Identity Provider
- ECLYPSE Authentication is Basic or SSO, using OpenID Connect.
- The SSO service allows a user to use one set of login credentials (e.g. username and password) to access multiple ECLYPSE controllers that are on the same network. This provides a secure centralized login method to authenticate users.
- The basic functionality behind an SSO service with ECLYPSE controllers is the Client-Server architecture where one controller is defined as the Server dedicated to authentication/authorization purposes to access the Client controllers.
- The SSO authenticates the user for all the controllers the user has been given rights to and eliminates further login prompts when the user accesses other controllers within the same session.
- The session ends if you close the web browser or you log out. It is recommended that you close your web browser after logging out.
User Authorization
- RBAC (Role-Based Access Control)
General Security Requirements
- All Security Requirements for ECLYPSE derived from ISA 62443 Security Level 4
Access Control
Identity infrastructure and PKI integration- PKI
- SSO
Topology
- RESTful API
Encryption
Data Encryption
- ECLYPSE Controllers have encryption that meets the FIPS 140-2 federal standard except for ECY-STAT and APEX.
- Basic security audit logs containing information about changes to the users as well as user successful and unsuccessful sign-ins.
- Meets encryption standards for mission-critical industries such as banking and for US government contracts.
Standards and protocols
- TLS minimum Protocol Version: TLSv1+, TLSv1.1+, or TLSv1.2
Digital signatures
- SHA256withRSA (2048-bit RSA asymmetric key)
Monitoring
Security Audit Log
- Basic security audit logs containing information about changes to the users as well as user successful and unsuccessful sign-ins.
It is the responsibility of the developer to account for the intellectual property and security concerns when they are building and programming a docker compatible image. Additionally, use the best practices when deploying the docker container over IoT Edge. See Microsoft and Docker documentation for more details and best practices
Visione
Come leader dell’innovazione nelle soluzioni di gestione dell’energia, Distech Controls offre tecnologie di gestione degli edifici e servizi unici che ottimizzano l’efficienza energetica e il comfort negli edifici, riducendo nel contempo tutti i costi operativi. Forniamo Soluzioni Innovative per Edifici più ecologici attraverso la nostra passione per l’innovazione, la qualità, la soddisfazione del Cliente e la sostenibilità.
Visione
Come leader dell’innovazione nelle soluzioni di gestione dell’energia, Distech Controls offre tecnologie di gestione degli edifici e servizi unici che ottimizzano l’efficienza energetica e il comfort negli edifici, riducendo nel contempo tutti i costi operativi. Forniamo Soluzioni Innovative per Edifici più ecologici attraverso la nostra passione per l’innovazione, la qualità, la soddisfazione del Cliente e la sostenibilità.
Physical Security
Protection of the physical assets that are hosting the data we wish to secure.
Secure Boot
EC-BOS-8 will only boot-up with digitally signed trusted software, providing assurance against alterationAuthentication
“Secure by Default”
- Users forced to have strong password strengths
- Users set up with the strongest authentication mechanism
- User lockouts upon consecutive bad log-ins
- Factory default password must be changed after commissioning
Single Sign-On with EC-Net as an Identity Provider
- SSO allows users to login into one station and access all other connected stations via a browser without having to re-authenticate.
- Eliminates need to manually configure and manage an external IdP.
Multi-Factor Authentication (MFA)
- Google 2 Factor Authentication
Digital certificate authentication
- Beneficial for kiosks via browser web connections
802.1x device network authentication
Access Control
Identity infrastructure and PKI integration
- LDAP
- Kerberos
- SAML 2 Identity Providers for Single Sign-On
Role-Based Access Control
- Provides access control for users by security role
- Managed by CategoryService and RoleService and assigned within UserService
Authorization
Authorization at API level
- Controls what individual software components can do
Standard and protocols
- SCRAM-SHA (256/512 bit) DIGEST – default
- EC-BOS-8: WPA-PSK128, WPA2PSK256
- Google 2 Factor Auth
- Client Cert Auth (Kiosk Mode)
- PKI
- LDAP
- Kerberos
- SAML 2 IDP SSO Integration
Encryption
Data Encryption
- All connections to stations are secured and encrypted, e.g. workbench to station, station to station and web connections
- Both EC-BOS-8 and EC-Net Supervisor have encryption that meets the FIPS 140-2 federal standard.
- Meets encryption standards for mission-critical industries such as banking and for US government contracts.
- Data is encrypted when sent/received, as well as at rest
Encrypted Protocols
- BACnet Secure Connect
Built in PKI management tools
- Niagara can integrate with any PKI infrastructure, LDAP directories, Kerberos
Third-Party Module Signing
- EC-Net now enforces the signing of newly added modules and makes administrators aware of any existing, unsigned third-party modules.
- Automatically eliminates the risk that modules may have been tampered with or come from an untrustworthy source.
Standard and protocols
- TLS 1.3, 1.2, 1.1, 1.0 issued with RSA 2048 bit certificate, SHA256withRSA
- AES 256-CBC Symmetric Key Encryption
- AES GCM)
- PBKDF2-HMAC-SHA256
- Digital signatures: SHA256withRSA (2048-bit RSA asymmetric key)
- FIPS 140-2 cryptographic module
Monitoring
Security Audit Log
- Provides users with a history of who, or what, is logging into or changing security-related settings on an EC-Net station
Security Dashboard
- Provides an actional view into security posture of your systems & other connected Niagara systems on your network