
5 Methods for System Hardening
5.4 Measures for system hardening
20 Security for Windows Embedded Operating Systems
Version 1.0, Entry ID: 55390879
Copyright Siemens AG 2011 All rights reserved
Disabling autostart mechanisms
The AutoRun or AutoPlay function automatically executes or runs software on a
removable storage medium that is connected to a PC. Malware can then be
installed without any explicit user action.
The AutoRun or AutoPlay function can be disabled. For a more detailed
description, please refer to the Microsoft Knowledge Base article on how to disable
AutoRun.
Disabling system services that are no t required
Just like network services, other system services can also be disabled to further
increase system security. However, this requires that these services be no longer
needed to perform the automation task or other necessary supplementary
functions.
Preventing unauthorized persons from accessing Windows
Essential protection of a PC in an automation solution can also be achieved by
preventing unauthorized persons from accessing the PC or by making it extremely
difficult for them to access the PC. To do so, two options are available:
• Limiting user rights using Windows means.
For details, see chapter 4 “Protection against Malware”.
• Locking Windows access, for example via the HMI application.
Locking Windows access using the HMI application can, or example, look as
follows:
• The PC is configured for autologin at boot and starts automatically with limited
rights as configured for a machine operator.
• When booting, the HMI application starts automatically. WinCC can be
configured so that no Windows access is possible until start.
• To allow Windows access for necessary maintenance work, a control element
to exit the HMI application can be configured in special, password-protected
maintenance screens.
Using write filters for embedded sy stems (EWF / FBWF)
Enhanced Write Filter (EWF) and File Based Write Filter (FBWF) allow the
protection of individual partitions of the mass storage against write access. Write
accesses during runtime are buffered in the RAM so that, from the software
perspective, it appears as if write access was possible. However, all write accesses
will be canceled when the next loss of voltage occurs or the next time the PC is
shut down/rebooted so that the PC starts in the state when enabling EWF/FBWF.
• By doing so, EWF/FBWF prevents software that has been installed without
authorization from remaining on the system on a permanent basis.
• However, it does not prevent the PC from infections by malware and the
malware can – as long as the PC remains turned on – continue to spread from
it. But as with software that has been installed without authorization, the
malware will typically be removed after rebooting.
• When enabling EWF/FBWF, it must be ensured that data is not stored on
partitions or directories that are not protected (EWF) or that were excluded
from protection (FBWF). It is absolutely necessary to follow the documentation
of the used software to see if and how data can be stored on unprotected
drives or directories.