background image

Chapter 4. Security Capabilities 

18 

PACSystems PROFINET IO Devices Secure Deployment Guide 

GFK-2904D 

Physical Security Perimeter Protection  

1)

 

All ICS hardware should be placed in locked cabinets, with policies and procedures to restrict access 
to the key.  

2)

 

Network equipment such as switches, routers, firewalls, and Ethernet cabling should be physically 
protected in locked enclosures such as cabinets or closets with policies and procedures to restrict 
access to these enclosures.  

3)

 

Whenever possible, there should be no physical network path from an ICS network to the Internet. It 
should not be possible for an attacker to reach an ICS network from any Internet-facing computer.  

4)

 

Networks should always be physically segmented as suggested in the Reference Network Architecture 
diagram (Figure 1) to avoid exposure to ICS networks.  

5)

 

Each ICS system asset should be visibly labeled by a unique identifier, with all expected asset 
identification compiled into an access controlled list. 

 

Electronic Security Perimeter Protection  

1)

 

All external access to an ICS network should be managed through a Virtual Private Network (VPN) or 
similar technology leveraging two-factor authentication.  

2)

 

Next-Generation Firewalls should be properly configured and deployed at each conduit between 
physical networks that deny all but the specifically allowed protocol families, source addresses, and 
destination addresses, and specific application-level commands between the two adjacent networks. 
For example, a Next-Generation Firewall could prohibit write operations across networks while 
allowing read operations.  

3)

 

If one network node such as a PLC or HMI uses unauthenticated protocols to exchange information or 
commands with another network node on the same physical network, a Next-Generation Firewall 
could be deployed between the two network nodes. This Next-Generation Firewall should be 
configured to explicitly whitelist all expected messages between the two network nodes, and deny all 
other unexpected messages.  

4)

 

To detect and alert for unexpected, unauthenticated messages on a given network, an Intrusion 
Detection System (IDS) could be configured and deployed. Consider configuring the IDS to log all 
events to a Security Information and Event Management (SIEM) system that aggregates all security 
information on the ICS network.  

5)

 

To detect and actively prevent unexpected, unauthenticated messages on a given network from 
reaching a given network node, an Intrusion Prevention System (IPS) could be configured and 
deployed. Consider configuring the IPS to log all events to a Security Information and Event 
Management (SIEM) system that aggregates all security information on the ICS network.  

6)

 

To limit the impact of the compromise of any single user account, it is recommended to divide 
administrator privileges into several user accounts, each for its own operational function.  

7)

 

To limit the impact of the compromise of any single set of credentials (user name, password) for any 
ICS equipment, it is recommended to never re-use credentials for different tools or purposes.  

8)

 

Carefully protect sources of and access to credentials (user names, passwords) for all ICS equipment, 
including switches, routers, firewalls, IDS, IPS, etc.  

9)

 

Enforce a policy of rotating credentials for ICS equipment periodically and after personnel changes. 
Note that products with no support for enforcement of unique passwords over time should be 
compensated for with policies and procedures that require a history of unique passwords.  

 
Recommendations on password complexity and management can be found in NIST 800-118, 

Guide to 

Enterprise Password Management

 

Summary of Contents for PACSystems* RX3i

Page 1: ...mation Controls For Public Disclosure Programmable Control Products PACSystems PROFINET IO Devices Secure Deployment Guide GFK 2904D PACSystems PROFINET IO Devices Secure Deployment Guide GFK 2904D Ju...

Page 2: ...rmational purposes only and GE makes no warranty as to the accuracy of the information included herein Changes modifications and or improvements to equipment and specifications are made periodically a...

Page 3: ...utomation com support Americas Phone 1 800 433 2682 International Americas Direct Dial 1 780 420 2010 if toll free 800 option is unavailable Customer Care Email digitalsupport ge com Primary language...

Page 4: ...mendations 6 2 5 Checklist 6 Chapter 3 Communication Requirements 7 3 1 Supported Protocols 8 ETHERNET Protocols 8 Serial Protocols 8 3 2 Service Requests 9 SNP 9 3 3 PROFINET 10 Installing an I O Dev...

Page 5: ...s 20 Firmware Signatures 20 Logging and Auditing 20 Chapter 5 Configuration Hardening 21 5 1 Scanner 21 5 2 Genius Gateway 22 Chapter 6 Network Architecture and Secure Deployment 23 6 1 Reference Arch...

Page 6: ...Contents GFK 2904D July 2018 iii Table of Figures Figure 1 Reference Architecture 23...

Page 7: ......

Page 8: ...ionals and developers responsible for deploying and configuring PROFINET I O products Secure deployment information is provided in this manual for the following products supplied by GE Automation Cont...

Page 9: ...ns in this Manual Rev Date Description D Jul 2018 Updated for IC695PNS101 IC695CEP001 C Feb 2017 Updated for replacement IC695PNS001 Bxxx implementation B Jun 2016 Updated Internet Layer Protocols tab...

Page 10: ...EP PROFINET I O Controller Manual GFK 2571 RX3i Manuals PACSystems RX3i System Manual GFK 2314 PACSystems RX3i PROFINET Scanner Manual GFK 2737 PACSystems RX3i CEP PROFINET Scanner User Manual GFK 28...

Page 11: ......

Page 12: ...Article GE Intelligent Platforms Security Advisories 2 2 Firewall Firewalls and other network security products including Data Diodes and Intrusion Prevention Devices can be an important component of...

Page 13: ...whitelisting software on control systems computers and keep the whitelist up to date 2 5 Checklist This section provides a sample checklist to help guide the process of securely deploying PROFINET I...

Page 14: ...uired for the intended application Successfully doing this requires knowing which protocol is needed for each system level interaction This section describes how the supported serial and Ethernet appl...

Page 15: ...client PROFINET DCP server PROFINET I O HTTP Server HTTPS Server MRP SNMP v1 server SNMP v2c server Serial Protocols In addition to Ethernet PROFINET I O Devices may also support communication over s...

Page 16: ...rds and OEM key and sweep information View and optionally clear a log of any faults that have occurred in the Controller The Service Request protocol is transported over a specific media by encapsulat...

Page 17: ...to the computer s network adapter It can then be used to re assign a unique name to the I O device being installed Note This protocol can also be used to make other modifications to the I O device suc...

Page 18: ...e of the application Protocol I O Controller I O Devices DCE RPC Client Server DCE RPC Server Client PROFINET DCP Client Server PROFINET I O Bi directional Bi directional In addition if the PROFINET n...

Page 19: ...a diagram showing firewall placement Lower Level Protocols Ethernet communication is typically described using four layers each with its own set of protocols At the top of that hierarchy is the Applic...

Page 20: ...quests to other servers using any of several different protocols The exact set of protocols that are enabled used will depend on which modules are installed how they are configured and the details of...

Page 21: ......

Page 22: ...ization and Enforcement Approving or rejecting access requests This section describes the Access Control capabilities supported by GE Automation Controls PROFINET I O Devices which includes its Author...

Page 23: ...ces from GE Automation Controls provide predefined access rights Predefined Access Rights Using the SNP Slave Application Protocol to update firmware on a PROFINET I O Device the Anonymous Subject is...

Page 24: ...on GE Automation Controls PROFINET I O Device PROFINET communications Plaintext Login Authentication for a protocol may involve sending a plaintext password to the Server In some cases these plaintex...

Page 25: ...th another network node on the same physical network a Next Generation Firewall could be deployed between the two network nodes This Next Generation Firewall should be configured to explicitly whiteli...

Page 26: ...subject must be separately managed for each instance of a given kind of server Changing Passwords Functionality Authenticated Subjects How Passwords are assigned Firmware Update PRIV Level 4 user Stat...

Page 27: ...n the table below Therefore compensating controls may be required to meet an installation s security requirements for protecting data in flight Protocol Provided Security Capabilities Transport Medium...

Page 28: ...0 in the hardware configuration and download to the PROFINET I O controller Ethernet Port Enable Set Port Speed of Port submodule to Disabled in the hardware configuration and download to the PROFINET...

Page 29: ...roller SD Card Identity Set the name of the Device using a DCP Client with the SD Card inserted Remove SD Card and enable the physical Write protect feature on the SD Card Re insert the SD Card in the...

Page 30: ...ion provides security recommendations for deploying PROFINET I O Devices from GE Automation Controls in the context of a larger network 6 1 Reference Architecture The Figure 1 shows a reference deploy...

Page 31: ...ts to just the minimum set required Further every access attempt successful or not and all blocked traffic should be recorded in a security log that is regularly audited 6 3 Access and Process Control...

Page 32: ...DCP protocol However to help ensure that the Maintenance computer cannot be used to launch attacks on the I O devices using other protocols the firewall it connects through should block all protocols...

Page 33: ......

Page 34: ...nd jitter As a result network architectures that require real time communications to pass through such devices may limit the applications that can be successfully deployed 7 3 Additional Guidance Prot...

Page 35: ...s are available on our web site www geautomation com Additional Resources For more information please visit our web site www geautomation com Copyright 2014 2018 General Electric Company All Rights Re...

Reviews: