Bedrock Automation Unveils Platform Strategy

Feb. 14, 2019
Built on the same platform as Bedrock Automation’s OSA Remote controller, the forthcoming OSA Proxy is designed to intelligently isolate downstream control networks while securely connecting controller data to IT.

Emerging on the automation technology scene less than five years ago, Bedrock Automation has been a visible and vocal advocate for greater industrial control system security. From the start, the company has focused on the embedded hardware that enables its products' open and secure capabilities—in particular, the secure ARM processing in its controller, I/O and power modules.

Since then, the company’s core messaging has revolved around the public key infrastructure (PKI) functionality designed into Bedrock Automation products’ computing core, which is sealed in all-metal, anti-tamper housing. According to Bedrock, the crypto keys in its products’ root of trust are authenticated by Bedrock’s certificate authority (CA) and use advanced signing and encryption technologies—like those used by secure military, aerospace and online financial transaction systems.

Read more about Bedrock Automation’s PKI and CA capabilities in “The Embedded Cybersecurity Trend.”

More recently, the company announced that its OSA (Open Secure Automation) remote controller had achieved Achilles Level 2 certification—signifying that the device has passed a series of tests, primarily demonstrating it’s ability to withstand denial of service (DoS) attacks while maintaining control of output variables. Other attack vectors tested for the Achilles certification include unauthorized access to the control system hardware, software and applications.

While visiting Bedrock Automation founder and CEO Albert Rooyakkers at the ARC Industry Forum 2019, he showed me the company’s forthcoming OSA Proxy device. The planned release date for the device is Summer 2019. Rooyakkers said this device is a firewall type of system that allows customers to secure legacy devices behind Bedrock's root of trust technology.

In addition to the embedded Bedrock PKI, the OSA Proxy also connects to industrial protocols such as Modbus, EtherNet/IP, and Common Industrial Protocol (CIP) and can translate these legacy protocols in real time to open and secure communications standards including OPC UA and MQTT.

Speaking of MQTT, Bedrock also announced at the ARC Industry Forum that it now offers a secureimplementation of the Cirrus Link Sparkplug B protocol in its OSA Proxy and OSA Remote. Bedrock explains that the Sparkplug specification defines how edge of network gateways, native MQTT-enabled end devices, and MQTT applications communicate bi-directionally within an MQTT infrastructure, and include support for complex data types, datasets, lower bandwidth requirements, and access to historical data.

Bedrock Automation says its Sparkplug B implementation is the only MQTT authentication and encryption agent providing a secure root of trust built on an intrinsically secure control platform.

The Proxy also features built-in anomaly detection on all of its ports to monitor traffic across the control network. This feature is enabled by the device’s 64-bit, quad-core processor, which allows for advanced cyber analytics of end-user applications.

“These features provide cyber defense for a legacy control network at minimal cost and complexity;,and it helps avoid the need for rip and replace,” said Rooyakkers.

Looking at the OSA Proxy and OSA Remote while speaking with Rooyakkers at the ARC event, it struck me that the form factors of both devices were very similar. The most obvious differences were the connection port types. He explained that this similarity is not by accident, and that this form factor for the two devices is actually a hardware platform design that Bedrock will continue to use for other forthcoming products.

“It fits in your hand and can be installed just about anywhere,” he said.

Despite the outward similarities of the two devices, Rooyakkers stressed that the OSAProxy is not a (remote terminal unit) RTU like the remote controller. "It’s an edge platform that can perform PLC-like functions, but with the power of blade server—with gigabytes of RAM and terabytes of storage," he said. "The Proxy talks to both IT and OT systems; it sits in between the two—above the PLC or DCS—and connects the controller data to the IT network. It's basically a device for gateway conversion of PLC data to the IT realm.

Rooyakkers said learning how to operate the OSA Proxy only requires about 15 minutes of training. “It provides ‘intelligent isolation’ of the downstream control networks with no configuration or maintenance required. It’s an intrinsic white-listing device that automatically white-lists all trusted devices on the control network; and any changes that are made in the PLC database get changed in the MQTT or OPC UA database. This device is designed so that OT owns it, not IT. This means you don't have to do IT maintenance in an OT environment.”

About the Author

David Greenfield, editor in chief | Editor in Chief

David Greenfield joined Automation World in June 2011. Bringing a wealth of industry knowledge and media experience to his position, David’s contributions can be found in AW’s print and online editions and custom projects. Earlier in his career, David was Editorial Director of Design News at UBM Electronics, and prior to joining UBM, he was Editorial Director of Control Engineering at Reed Business Information, where he also worked on Manufacturing Business Technology as Publisher. 

Companies in this Article

Sponsored Recommendations

Put the Plant Floor in Your Pocket with Ignition Perspective

Build mobile-responsive HTML applications that run natively on any screen.

Ignition: Industrial-Strength System Security and Stability

Ignition is built on a solid, unified architecture and proven, industrial-grade security technology, which is why industrial organizations all over the world have been trusting...

Iron Foundry Gains Competitive Edge & Increases Efficiency with Innovative Technology

With help from Artek, Ferroloy implemented Ignition to digitally transform their disconnected foundry through efficient data collection and analysis while integrating the new ...

Empowering Data Center Growth: Leveraging Ignition for Scalability and Efficiency

Data center growth has exploded over the past decade. Initially driven by organizations moving their computer assets to the cloud, this trend has only accelerated. With the rise...