Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Security, Compliance and Redundancy

Our platform's security tools offer comprehensive measures to safeguard

About the Security Module

The security module provides various security measures to protect

the system and its data

, including

. This includes access control, user authentication, and data encryption.

It enables users to

Users can easily define and manage user roles and permissions,

limiting

controlling access to specific system areas

of the system

based on user roles and privileges.

The

module

platform also supports multi-factor authentication and includes features

such as

like audit trails and activity logs

, which

. These features track user activity within the system, providing a detailed record of

who accessed what

data

and when

access. This helps

detect

in detecting and

investigate

investigating security breaches and

identify

potential

security

threats.

The security module also supports various industry

Industry-standard security protocols

, including

such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

, which provide

are supported with our platform. These protocols ensure secure data transmission between the system and other devices or applications.

Image Removed

On this page:

Table of Contents
maxLevel3
stylenone


Key Functionalities

Image Added


Features Highlights

The Security Module in FactoryStudio provides a range of features to ensure comprehensive security for your projects. Key features include:

  • User Management: Easily create and manage user profiles with customizable access levels to project components.
  • Group-based Permissions: Define the access level for each user group within the project.
  • Session Policies: Manage user identification and session control requirements.
  • Runtime Users: Dynamically add and remove users without needing to modify the project.
  • Integration with Active Directory and LDAP: Seamlessly streamline user management across your organization.

Security

FDA 21 CFR Part 11 and NERC 

Our software platform offers various security and compliance features to assist organizations in meeting the requirements of FDA 21 CFR Part 11. It's important to recognize that compliance is a continuous process. Therefore, organizations should consistently monitor and update their systems and policies to ensure alignment with the standards set by the FDA.

Built-in .NET Security 

Our platform’s development relies on .NET and utilizes managed code, adhering to security guidelines. Development with .NET managed code must comply with .NET rules. Specific guidelines are tailored for different modules. For instance, Alarms adhere to FDA guidelines, while Electrical device communications adhere to IEC61850 standards, among others. Below, we'll outline the main FS-Security topics along with some basic information about each.

Group and User Permissions 

The platform offers Using our platform, you have total flexibility to define privileges based on groups or specific individual users. Permissions can be global set globally or tied to a specified display, objectlinked to specific displays, objects, or input actionactions.

Runtime Users 

Dynamically Easily create users on the fly and store their credentials in SQL databases. Get You can also retrieve users from Active Directory or third-party system systems for integrated security or and unified login.

User Policies

Identification We offer a complete set of user management features, including identification policies, session duration , control, automated logoff, e-signsignatures, audit -trail,and a bundle of user management features is available.

FDA and NERC Regulated Applications

Our platform allows delivering applications in compliance with Title 21 CFR Part 11, and it was designed following the applicable recommendations from NERC, such as the CIP- 007-1-Cyber Security-System Management.

Core-Level Security

Security must be implemented at the core, not applied externally. Our modules have built-in security-related components designed from the core.

TipRedundancy switch time and high-volume data were tested to meet rigorous offshore requirements. 

trails, and more.

Redundancy

Hot-standby Fault-tolerant

Servers

Servers 

The platform Our platform provides reliable and easily configurable redundancy for seamless failover. It automatically initializes and continues to synchronize synchronizes the primary and secondary servers. The Device communication channels are also easily set up for Additionally, setting up redundant physical networks and redundant PLC nodes for device communication channels is straightforward.

Database Redundancy

You can assign the Alarm and Historian databases can be assigned database to a third-party external cluster, or they can be automatically replicated automatically when running on the platform's platform’s servers.

Project Configuration Synchronization

Engineering The engineering tools provide offer features to that simplify configuration and updates in redundant scenarios.

Hot-swapping

Redundant or stand-alone servers allow dynamic enable seamless switching of project versions, without interrupting ensuring uninterrupted service for connected clients and keeping while maintaining the real-time database loaded.

Redundancy at the Core

Level

Level 

All modules (, including Real-Time tags, Devices, Alarms, HistoriansHistorian, Scripts, and Clients, and others) were designed built from the ground up to meet redundancy and hot-swapping requirements. 

Redundancy can be set individually for each Execution Profile (Development, Testing and Production)


Info

Learn more at Security , (Users and Roles).




In this section...

Page Tree
root@parent
spaces93DRAF