Chapter 2. Introduction
6
PACSystems PROFINET IO Devices Secure Deployment Guide
GFK-2904D
2.4
General Recommendations
Adopting the following security best practices should be considered when using GE Automation & Controls
products and solutions.
•
The PROFINET I/O Devices covered in this document were not designed for or intended to be
connected directly to any wide area network, including but not limited to a corporate network or the
Internet at large. Additional routers and firewalls (such as those illustrated in
Figure 1: Reference
Architecture
) that have been configured with access rules customized to the site's specific needs must
be used to access devices described in this document from outside the local control networks. If a
control system requires external connectivity, care must be taken to control, limit and monitor all
access, using, for example, virtual private networks (VPN) or Demilitarized Zone (DMZ) architectures.
•
Harden system configurations by enabling/using the available security features, and by disabling
unnecessary ports, services, functionality, and network file shares.
•
Apply all of the latest product security updates from GE Automation & Controls, SIMs, and other
recommendations.
•
Apply all of the latest operating system security patches to control systems computers.
•
Use anti-virus software on control systems computers and keep the associated anti-virus signatures
up-to-date.
•
Use whitelisting software on control systems computers and keep the whitelist up-to-date.
2.5
Checklist
This section provides a sample checklist to help guide the process of securely deploying PROFINET I/O
products.
1)
Create or locate a network diagram.
2)
Identify and record the required communication paths between nodes.
3)
Identify and record the protocols required along each path, including the role of each node. (Refer to
Chapter 3,
Communication Requirements
.)
4)
Revise the network as needed to ensure appropriate partitioning, adding firewalls or other network
security devices as appropriate. Update the network diagram. (Refer to Chapter 6,
Network
Architecture and Secure Deployment
.)
5)
Configure firewalls and other network security devices. (Refer to Section 3.4,
Ethernet Firewall
Configuration
and Chapter 6,
Network Architecture and Secure Deployment
.)
6)
Enable and/or configure the appropriate security features on each PROFINET I/O Device. (Refer to
Chapter 4,
Security Capabilities
.)
7)
On each PROFINET I/O Device, change every supported password to something other than its default
value. (Refer to Section 4.4,
Password Management
.)
8)
Harden the configuration of each PROFINET I/O Device, disabling unneeded features, protocols and
ports. (Refer to Chapter 5,
Configuration Hardening
.)
9)
Test/qualify the system.
10)
Create an update/maintenance plan.
Note:
Secure deployment is only one part of a robust security program. This document,
including the checklist above, is limited to providing secure deployment guidance only.
For more information about security programs in general, refer to Section 7.3,
Additional
Guidance
.
Summary of Contents for PACSystems* RX3i
Page 6: ...Contents GFK 2904D July 2018 iii Table of Figures Figure 1 Reference Architecture 23...
Page 7: ......
Page 11: ......
Page 21: ......
Page 33: ......