cancel
Showing results for 
Search instead for 
Did you mean: 
SOLVED

How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

WetheNorth
New Poster

How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

3 REPLIES 3
Jochen_Mueller
Community Moderator

Re: How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

Here we provide some features to block any cyber attack.

  • user management (security by default)

Any access to the ctrlX CORE will be protected by an integrated user manamement. Means every contact must be authorized with username and password. There can be different user with different access rights, configured by the OEM.

  • Rexroth Firewall app

It's possible to install our Reroth Firewall app, where you can block (black list) or allowed (white list) communication ports. The app is working in both communication directions. Means you can block/allowed ports TO the ctrlX CORE, to fight attacks coming from outside. And you can block/allowed port FROM the ctrlX CORE to fight attacks coming from e.g. a dangerous third party app.

  • automatically system apps update over device portal

To have always the latest version of ctrlX CORE system apps (e.g. securty updates of linux OS, ...)  you can use our device portal service. Here you have the possibility to start/configure remote updates of apps, in case new versions are available.

You see we have some actons the customer can use to protect his system.

StefanH
Community Moderator

Re: How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

Please note also the information provided by ctrlX IoT:

Security by Design

  • Secure Engineering Process
    • BOSCH Security and Engineering Process – Focus of IT Security and Data Protection
    • Guideline according IEC 62443 for SL2 and SL3 certification*
  • Secure Hardware & Software
    • Running Ubuntu Core – the most secure, minimal footprint embedded Linux
    • Secure Boot – Apps will be checked during start-up for system integrity
    • TPM2.0 Chip – Trusted Platform Module on board to manage private keys
    • Secure Production Mode – User defined control mode with minimal network footprint
  • ctrlX CORE User Management
    • System-wide identification and access control for all ctrlX Apps and ctrlX Data Layer

Secure by Default

  • Minimal Software Configuration
    • ctrlX CORE will be shipped only with system apps and apps of user configuration
  • Highest Security Level on the first start-up
    • ctrlX CORE is configured to only allow installation of signed apps at initial state
  • ctrlX CORE User Management
    • The user must change password of system user, when logging in at the first time
    • Access only via web interface at the initial start

Here are detailed information about the Firewall and VPN App:

https://docs.automation.boschrexroth.com/document/version/1.0/R911403782_01_Firewall-App_-1_-en_US/d...

https://docs.automation.boschrexroth.com/document/version/1.0/R911403774_01_VPN-Client-App_-1_-en_US...

PedroReboredo
Community Moderator

Re: How do we ensure against cyber threats with the ctrlX AUTOMATION Platform?

I merged your post related to third party apps into this thread.

How does Bosch Rexroth ensure apps used with ctrlX AUTOMATION are safe and secure?

  • Rexroth Apps
  • Partner Apps
  • Any third party apps

Do we screen them prior to allowing them on our App store?

Do we make any app creator certify to a security standard?



In extension to our own Security mechanisms the Snap technology is a main fundament. Every app is containerized and bundle all related dependencies in one standalone package. This includes also the definition of permissions.

See e.g.

 

Related to third party app Security

We support security by design an an inherent block for our own apps (as stated above). Of course we want to make sure, that also also our partners deliver security-proven apps by using our security features, e.g. User Authorization and Authentification, Reverse Proxy etc. This is one essential part of our quality gates for third-party apps. As part of the partner program, we support our partners in reaching this goal.

 

Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist