FIELD: means of ensuring security; data processing.
SUBSTANCE: invention relates to a method of ensuring security of interaction with devices of an automated system. Disclosed is a method, according to which: generating a security configuration for a data transmission application based on the architecture of the automated system, at least providing protection of the automated system devices from malicious actions that can be carried out on behalf of the application; wherein the security configuration is a set of requirements for applications in order to limit actions by applications, through which unauthorized access to resources of the automated system is obtained; installing an application for transmitting data to a gateway, which is connected to devices of an automated system through a network, taking into account the generated security configuration, wherein the application for transmitting data is not a trusted application; performing data transmission from the automated system devices and back through the data transmission application, the actions of which are limited by the security configuration, wherein at least data directed from the outside are limited according to the security configuration.
EFFECT: technical result consists in ensuring the safety of interaction of devices of an automated system.
4 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF GATEWAY CONFIGURATION FOR AUTOMATED SYSTEMS PROTECTION | 2019 |
|
RU2746105C2 |
DATA ACCESS CONTROL SYSTEM AND METHOD | 2021 |
|
RU2790338C1 |
NETWORK GATEWAY AND METHOD FOR TRANSFERRING DATA FROM A FIRST NETWORK TO A SECOND NETWORK | 2021 |
|
RU2770458C1 |
SYSTEM AND METHOD FOR SECURING IOT DEVICES BY INSTALLING SECURITY COMPONENTS | 2022 |
|
RU2798178C1 |
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE | 2016 |
|
RU2635269C1 |
SYSTEM AND METHOD OF CONTROLLING ACCESS TO CYBER PHYSICAL SYSTEM | 2019 |
|
RU2726884C1 |
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE | 2021 |
|
RU2757651C1 |
SYSTEM AND METHOD OF COUNTERING ANOMALIES IN THE TECHNOLOGICAL SYSTEM | 2019 |
|
RU2747461C2 |
SYSTEM AND METHOD FOR DETECTING ANOMALIES IN A TECHNOLOGICAL SYSTEM | 2019 |
|
RU2750629C2 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
Authors
Dates
2020-06-25—Published
2019-02-07—Filed