Industrial control computers (ICCs) are critical components in automation and manufacturing environments, managing processes that require precise control and real-time responsiveness. Proper permission and account configuration is essential to prevent unauthorized access, reduce security risks, and ensure operational continuity. This guide outlines key strategies for configuring accounts and permissions on ICCs to align with industrial security standards and operational needs.

Role-based access control (RBAC) is a foundational security model that assigns permissions based on job responsibilities rather than individual identities. In industrial settings, RBAC simplifies permission management and reduces the risk of accidental or malicious configuration changes.
Start by identifying the distinct roles within your industrial environment, such as operators, maintenance technicians, engineers, and administrators. Each role should have clearly defined responsibilities that align with their access requirements.
Operators: Grant read-only access to critical process data and limited control over basic functions like starting or stopping equipment. Avoid giving operators permission to modify system configurations or install software.
Maintenance Technicians: Allow access to diagnostic tools and the ability to reset alarms or clear faults. Restrict changes to process parameters or network settings to prevent unintended disruptions.
Engineers: Provide permissions to adjust process settings, calibrate sensors, and update control logic. Engineers should also have access to historical data for analysis but not to administrative functions like user management.
Administrators: Reserve full system access for administrators, including user account creation, permission assignments, and software updates. Limit the number of administrators to reduce the attack surface.
The least privilege principle ensures that users have only the permissions necessary to perform their tasks. This minimizes the potential damage from compromised accounts or human errors.
Granular Permissions: Break down permissions into small, specific actions rather than broad categories. For example, instead of granting "full control" over a PLC, assign separate permissions for reading data, writing parameters, and restarting the device.
Temporary Elevation: For tasks requiring elevated privileges, use temporary access grants that expire after a set period. This reduces the risk of long-term exposure if an account is compromised.
Audit Trails: Enable detailed logging of all permission changes and access attempts. Regularly review these logs to detect unauthorized activities or misconfigurations.
Weak passwords are a common entry point for attackers in industrial systems. Implement robust password policies and multi-factor authentication (MFA) to enhance account security.
Password Complexity Requirements: Enforce the use of long, complex passwords that include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid common words or patterns that are easy to guess.
Password Expiration and Rotation: Require users to change passwords periodically, such as every 90 days. Prevent the reuse of old passwords to ensure that compromised credentials become obsolete quickly.
Multi-Factor Authentication (MFA): Implement MFA for all administrative and critical user accounts. This adds an extra layer of security by requiring a second form of verification, such as a code sent to a mobile device or a biometric scan.
Proper account lifecycle management ensures that only authorized users have access to industrial control computers and that inactive accounts are removed promptly.
Onboarding Process: Establish a formal onboarding process for new users that includes account creation, role assignment, and security training. Document all steps to ensure consistency and compliance.
Regular Account Reviews: Conduct periodic reviews of all user accounts to identify inactive or outdated accounts. Deactivate or delete accounts for employees who have left the organization or changed roles.
Offboarding Procedures: Define clear offboarding procedures for departing employees. This includes revoking access to all systems, collecting physical tokens or devices, and updating access logs.
PREVIOUS:Calibration of data acquisition channels in industrial control computers
