You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

Designed for Reliable Performance and Enterprise Security

FrameworX combines deterministic real-time performance with comprehensive security architecture. Built on the [Technology Foundation] of 100% managed .NET code, the platform delivers millisecond response times while maintaining defense-in-depth protection and full compliance capabilities.

Operational Excellence:

  • Performance monitoring with <100ms tag updates & 1ms timestamps
  • Multi-layer security with RBAC, Secrets  and encryption
  • Compliance ready: FDA, IEC 62443, NERC-CIP
  • Git-based DevOps with JSON export
  • Hot-standby redundancy with <5 second failover
On this Page:


Optimized  Architecture

Optimization Layers

LayerOptimizationImpact
ApplicationEfficient scripts, optimized queriesCPU usage
RuntimeThread pool tuning, memory managementResponse time
DatabaseIndexing, partitioning, archivingQuery speed
NetworkCompression, protocol selectionBandwidth
HardwareCPU cores, RAM, SSD storageOverall capacity

Performance Metrics

MetricTargetMeasurement
Tag Update Rate<100msDevice to display. Test case: 100,000 Modbus tags  in  < 1s
Alarm Response<1 secondCondition to notification,  keeping 1ms timestamp on logs
Client Response<200msUser display action to feedback
Displays Update< 50msCode behind execution and realtime updates on diaplays
Historian Write<1 secondTag change to storage, keeping 1ms timestamp on logs
Failover Time<5 seconds

Primary to standby

(*) Those are expected numbers in a typical implementation. Exact metrics depending on solution design and hardware

Built-in Performance Monitoring Tools:

  • Real-time performance dashboards
  • Resource utilization tracking
  • Bottleneck identification
  • Historical trend analysis

Operational Stability

  • 100% Managed Code - No memory leaks or pointer errors
  • Exception Handling - Graceful failure recovery at every level
  • Multi-threaded Execution - Parallel processing with thread safety
  • Resource Management - Automatic garbage collection and optimization
 

Security Architecture

Defense in Depth Implementation

Layer Protection LevelComponents

Layer 1: Network. Security 

Perimeter defense

  • Hardware: Firewall VLAN / VPN Access
  • Software: IP filtering, connections-Monitoring

Layer 2: Application Security

Access control

  • Identification: WA, LDAP, OAuth, Native, Custom
  • Authorization: (Role-Based Access)

Layer 3: Data Security 

Information security

  • Database Encryption 
  • Secure Communication & Audit Logging

Layer 4: Operational Security

Process integrity

  • Change Management & Built-in Validation 
  • Backup/Recovery & Incidents Recovery 

Security Zones Architecture (ISA-99/IEC 62443)


TSecureGateway enables secure data transfer across zones, bridging Level 2 (factory floor) to Level 4 (enterprise) while maintaining isolation and protection against threats.



Authentication & Authorization

Flexible Authentication Methods

Enterprise IntegrationNative Options
  • *Active Directory* - Windows domain SSO
  • *LDAP Server* - Directory services
  • *OAuth* - Modern authentication
  • *External Systems* - Custom providers
  • *Built-in Database* - Local user management
  • *Runtime Users* - Dynamic generation
  • *SQL Database* - External user stores
  • *Electronic Signatures* - Action verification

Role-Based Access Control (RBAC)

  • Granular Permissions - Display, object, and action-level control
  • Group Hierarchies - Inherited permissions with override capability
  • Dynamic Roles - Runtime permission changes based on context
  • User Policies - Password complexity, session duration, auto-logoff



Compliance & Standards

Industry Standards Implementation

StandardImplementationKey Features
ISA-95UNS design patternsEnterprise/control integration model
ISA-101HMI design complianceOperator effectiveness standards
FDA 21 CFR Part 11Electronic records/signaturesAudit trails, data integrity, validation
High Performance HMIDisplay design principlesSituational awareness, alarm management
IEC 62443Cybersecurity guidelinesSecurity zones, defense in depth
NERC-CIPCritical infrastructureAccess control, monitoring, recovery



DevOps & Version Control

Enterprise Development Practices

Native ToolFeature
JSON-Git ExportHuman-readable diffs for Git integration 
Change TrackingKeep track of changes at object level, with automated version numbering
Cross ReferenceDependency analysis and automated rename for all configuration objects
Build ProcedureValidation of all server scripts and all displays scripts
Publish ProcedureReadonly deployment files for regulated areas
Execution ProfilesManagement  for Development, Validation, Production and Custom environments.
DevOps APIsProgrammatic control of configuration and execution
Health Monitoring Built-in runtime metrics and web dashboard
Container SupportDocker deployment including support for App Hosting in Cisco Routers
Execution Integrity Built-in diagnostics to verify if running solution matches a given configuration.

Solution Configuration Protection

  • Encrypted Configuration - All settings in protected .dbsln file
  • IP Protection - Source code and binaries secured
  • Single File Deployment - Simplified distribution and management
  • Access Control - Role-based modification rights



Redundancy & High Availability

Hot-Standby Configuration

FeatureSpecificationBenefit
Automatic Failover<5 seconds switchoverMinimal disruption
Data Synchronization<5 seconds switchoverNo data loss
Client ReconnectionTransparent to operatorsContinuous operation
State PreservationFull context maintainedSeamless recovery

(*) Those are expected numbers in a typical implementation. Exact metrics depending on solution design and hardware

Supported Redundancy Modes:

  • Server redundancy (primary/standby)
  • Database redundancy (mirrored/centralized)
  • Network redundancy (dual-path)
  • Device redundancy (PLC communication)

External Validation

  • Regular third-party penetration testing
  • Veracode security assessments
  • Gap analysis and remediation
  • 100% approval requirement for release



In this section...

The root page @parent could not be found in space 93Draft.



  • No labels