Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Ray Verhoeff Vice President – Engineering.

Similar presentations


Presentation on theme: "Security Ray Verhoeff Vice President – Engineering."— Presentation transcript:

1

2 Security Ray Verhoeff Vice President – Engineering

3 Security Agenda Operating System Security PI Server Security PI Clients Auditing “Best Practices” White Paper

4 Security Motivation Widely held misconceptions Pharmaceutical Industry audits

5 Security What do these have in common? Complete Works of Shakespeare The Bible California Tax Code Tao Te Ching 21CFR11

6 Security Answers… None are clear or specific Subject to interpretation Have inspired great minds to debate the issues for hours Commentaries now outweigh the original document

7 Security 21CFR11 Electronic Records “Code of Federal Regulations” Not Law Not Standard Subject to interpretation Details will be shaped by FDA rulings

8 Security Examples Electronic Signature Human Readable

9 Security 21CFR11 Tug-of-War Users want software to handle everything Vendors push for Standard Operating Procedures (SOP)

10 Security Misconceptions PI files are installed “Everyone/Full Control” piadmin/pidemo have no password No login prompt when on Server console “PI does not support Windows integrated login”

11 Security PI Installation “Setup” is a starting point Site must configure PI for its own environment

12 Security Physical Security This means locking the computer room Access to the hardware can always compromise security Reboot Power off Pull network wire

13 Security Operating System Security Groups, Users & Passwords control access to privileged accounts File Permissions Auditing

14 Security Usernames & Passwords Domain users Independently validated by Domain Controller Passwords: Lifetime: min & max Length History Complexity

15 Security Windows Auditing You can track just about any operation Login/Logout File Operations creation deletion execution change permissions/take ownership “Traverse Folder”

16 Security Windows Event Log All audit messages go here Security group Do not configure “Overwrite as Needed” Loss of audit trail SOP must be in place: backup audit trail manually purge

17 Security File Permissions PI Server will run with D:\PI set to: Local Administrators/Full Control Everyone else/Nothing

18 Security Standard Operating Procedures Control access to Domain Administrator account No auto-login Don’t expose PI directory as File Share You may expose the PI backup directory read-only

19 Security PI Server Security PI Firewall restrict access to your IP domain PI Trust don’t map to “piadmin” PI Users and Groups

20 Security Connecting to PI PI API vs. PI SDK Connecting vs. Logging In The Default User

21 Security The Default User no name, can’t assign one no group, can’t assign one gets “world” access Disable this in PI 3.3 SR2 if disabled, PI Server appears empty Degrade to this if you attempt a login and fail!

22 Security Windows Integrated Login “Login to Windows = Login to PI” You still need to: Control which Windows users are PI users Assign ownership and permissions of PI points, etc.

23 Security PI Trust Strong start with PI Trust table Supports Windows domain membership as well as TCP/IP credentials “Domain,User,PIuser” as “OSI,$,$” is powerful PI ICE uses this exclusively

24 Security PI Client User Experience PI API clients attempt a login Gives perception that PI does not support Windows login PI SDK clients attempt a trust lookup If trust is Domain-based, you have integration

25 Security PI SDK Clients PI Point Builder PI Tag Configurator PI Auto Point Sync PI ICE 1.0 PI ProcessBook 3.0 PI Datalink 3.0

26 Security 21CFR11 Audit Requirements Record Windows username of editor Contents are unreadable Contents cannot be tampered with Maintained outside primary data store

27 Security PI Audit Requirements Cannot detract from the primary function of the PI Server To support this: Audit trail cannot be read on-line PI does not process or format the trail pidiag -xa PI Audit Viewer

28 Security PI Audit Viewer – Edit

29 Security PI Audit Viewer – Detail

30 Security PI Audit Database additions PI Batch database auditing PI Module Database auditing

31 Security PI Audit Database futures Auditing of new events for specific points Workaround: code using “replace” mode when inserting data

32 Security Best Practices White Paper Gives details of Windows and PI configuration Many thanks to OSIsoft Field Service Supplements “PI in Compliance”

33 Security Questions? ASSIGN CONTEXT ANALYZE DISTRIBUTE VISUALIZE ACT GATHER EVENTS & DATA Data Collection from Inside and Outside the Corporation Make the data relevant to users Aggregation, Analysis, Reconciliation, Calculation, Cases Get the Information to people who need it People Need Pictures, Graphs, Trends specific to their Role Without Action, there is no Benefit. Empowered people take better Actions!


Download ppt "Security Ray Verhoeff Vice President – Engineering."

Similar presentations


Ads by Google