Security¶
Security and data protection on Emalytics Collector
Overview¶
Emalytics Collector provides cloud-based data acquisition, Emalytics Analyzer, and control. Inevitably, these services require a connection between your building automation network (.i.e, the customer's) and the Emalytics Collector platform, as well as storing and processing data on it.
Some of our customers have initially been concerned about connecting their building network to the Internet, even if only to our platform. Typical concerns are:
"The building automation network is not connected to the Internet for security reasons."
- Large german real estate operator
"80 % of our customers insist on a physical separation of building automation network and Internet for example via serial communication."
- Provider of cloud-based control algorithms
"We need more information to convince the building operator."
- Energy service company
Many of our existing customers' apprehensions were settled once they had understood exactly which connections are made, how they are established, and for what reasons. In this article, we thus explain and review the precautions and security measures {{ company_name }} takes to protect your building network and data.
The Emalytics Connector¶
Operating System and Software¶
The Phoenix Contact Emalytics Connector runs Ubuntu 20.04 LTS Server and is hardened according to industry standards established by the dev-sec project. Before it is commissioned, each Emalytics Connector must pass an extensive series of functional and penetration tests. During operation, each Emalytics Connector is rigorously monitored on hardware, system and application level and receives automatic security updates daily.
On request, the Emalytics Connector's software stack can run on your own hardware and operating system.
Connecting to the building network¶
The Emalytics Connector has two built-in network adapters. The first network adapter must be directly connected to the local building automation network. This is important to support auto-discovery of devices and their datapoints as many building communication protocols such as BACnet use broadcasts in the local network for auto-discovery and these broadcasts are per standard not forwarded outside of the local network. The Emalytics Connector will only communicate on the port(s) corresponding to the targeted building automation network protocol, e.g., port 47808 for BACnet.
The installation and connection of the Emalytics Connector is done by the customer's local technician. In particular, Phoenix Contact will never require physical access to your networks.
If certain data points or entire areas of the building must not be read out, this can either be technically prevented in advance (e.g. by network masks or VLANs) or handled flexibly within the settings of the Emalytics Connector. Together with you, we select data points which should be written or stored, and which should not be, since they can be classified as critical or privacy-sensitive.
Connecting to Emalytics Collector¶
The second network adapter of the Emalytics Connector must be connected to a network with Internet access. Through this network interface, the Emalytics Connector establishes a connection to the servers that host the Emalytics Collector platform. This connection is required, e.g., for data acquisition and remote administration. All communication between the Emalytics Connector and Emalytics Collector is secured via TLS or SSH.
In most deployment scenarios, local networks with Internet access are placed behind a firewall that limits outgoing connections. In this firewall, the following ports need to be opened as detailed in the admin guide.
For deployments with critical security requirements, e.g., hospitals or banks, the listed requirements can be reduced down to opening only port 443/TCP for HTTPS traffic and additional security measures such as VPN tunnels can be employed.
All communication is established unidirectionally, i.e., from the Emalytics Connector to the Emalytics Collector platform, and can be cleared or blocked accordingly in your firewalls. No external access to your network ever takes place. Your networks can remain completely closed and thus protected against external access by your existing firewalls. Thus there is no direct connection of the building automation network and hardware to the Internet.
The Emalytics Collector platform¶
Hosting¶
The Emalytics Collector platform and all services built on top are hosted on dedicated and virtual servers by the Hetzner Online GmbH, based in Gunzenhausen, Germany. Hetzner is certified according to DIN ISO/IEC 27001 for its IT security standards and has won numerous awards. Hetzner operates data centers in Germany and Finland. Emalytics Collector is hosted on servers located in their data centers at Nürnberg and Falkenstein, Germany.
On demand, Phoenix Contact stores and processes your data on dedicated servers thereby excluding residual risks due to co-location of virtual machines.
Server authentication¶
All our servers and services are authenticated using standard X.509 certificates issued by Let's Encrypt that are renewed each quarter. As of January 2019, Let's Encrypt has a market share of more than 50%.
Service availability¶
All servers have DoS protection and multi-redundant connectivity to guarantee high availability. Phoenix Contact guarantees 97% uptime for the Emalytics Collector platform.
Custom Service Level Agreements (SLAs) with higher uptime guarantees can be negotiated.
Storage and Processing¶
All storage and processing of data on Emalytics Collector is strictly encapsulated and separated - down to the system level. In practical terms, this means in the first instance that a dedicated database is operated for each customer - the customer data is therefore separated. In the second instance, this means that virtual users in the backend, such as micro services, but also real users, only receive those rights (privileges) by default that they need for their intended purpose. For example, a data-evaluating, i.e. reading, service may not write data points by default. In the third instance, all processes at system level are separated from each other using Docker containers and only interconnected in dedicated virtual networks if necessary. For example, the analysis of one customer's data is strictly separated from the analysis of another customer's data.
User authentication and authorization¶
By default, user authentication takes place via username and password. Other identity providers, e.g., LDAP and Active Directory, can be integrated through OpenID connect, OAuth, and SAML. Thus, company-wide single sign-ons and integration of existing user databases are possible.
After a user is authenticated, all his/her accesses to the Emalytics Collector cloud platform are authorized through a comprehensive role-based access control (RBAC) system. Predefined, standardized roles are available but you can also freely define new roles with individual authorizations in a fine granular manner through the APIs.
Access can be controlled down to the granularity of allowing read or write access on single datapoints. E.g., you can grant users rights to modify the temperature in their office but nowhere else.
Our promise of security¶
We are convinced that digitization, and, in particular, the use of cloud and IoT technology, are key to enable and implement resource-conserving, energy-efficient, and user-expanding solutions. In this process, security and data protection are not nice-to-have, but a non-negotiable requirement that must be addressed and built into the design of IT systems right from the start.
That is why Phoenix Contact commits to permanently guarantee highest security and data protection standards. If at any time there is any uncertainty about the function of our services, the guarantee of security and data protection, you are welcome to contact us with your questions at any time.
Moreover, we walk the talk: Phoenix Contact is currently in the process of obtaining DIN ISO 27001 certification.