SYS600 Security Guide
SYS600 Security Guide
3
Cyber Security Deployment Guideline
Trace back information:
Workspace Main version a11
Checked in 2012-11-13
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Contents
1 Copyrights ............................................................................................. 5
2 Introduction ........................................................................................... 6
2.1 This manual .................................................................................. 6
2.2 Use of symbols ............................................................................. 6
2.3 Intended audience ........................................................................ 6
2.4 Document conventions ................................................................. 7
2.5 Document revisions ...................................................................... 7
3 General ................................................................................................... 8
3.1 Definitions and Abbreviations ....................................................... 10
3.2 Reference Documents .................................................................. 11
3
SYS 600 9.3 MicroSCADA Pro 1MRS756796
8 Maintenance .......................................................................................... 35
8.1 Configuring network location ........................................................ 35
8.2 Adding new Windows users .......................................................... 35
8.3 Adding/installing new programs .................................................... 36
8.4 Adding new SYS 600 applications ................................................ 37
8.5 Adding Windows features ............................................................. 37
8.6 Modifying security settings ............................................................ 37
8.6.1 Latest hardening scripts .................................................. 37
8.7 Troubleshooting ............................................................................ 38
Appendices
4
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
1 Copyrights
The information in this document is subject to change without notice and should not be
construed as a commitment by ABB Oy. ABB Oy assumes no responsibility for any
errors that may appear in this document.
In no event shall ABB Oy be liable for direct, indirect, special, incidental or consequential
damages of any nature or kind arising from the use of this document, nor shall ABB Oy
be liable for incidental or consequential damages arising from the use of any software
or hardware described in this document.
This document and parts thereof must not be reproduced or copied without written
permission from ABB Oy, and the contents thereof must not be imparted to a third party
nor used for any unauthorized purpose.
The software or hardware described in this document is furnished under a license and
may be used, copied, or disclosed only in accordance with the terms of such license.
Copyright © 2012 ABB Oy. All rights reserved.
Trademarks
ABB is a registered trademark of ABB Group. All other brand or product names
mentioned in this document may be trademarks or registered trademarks of their respective
holders.
Guarantee
Please inquire about the terms of guarantee from your nearest ABB representative.
Third Party Copyright Notices
This software uses pugixml library (http://pugixml.org). pugixml is Copyright ©
2006-2012 Arseny Kapoulkine.
5
SYS 600 9.3 MicroSCADA Pro 1MRS756796
2 Introduction
Tip icon indicates advice on, for example, how to design your
project or how to use a certain function.
Although warning hazards are related to personal injury, and caution hazards are
associated with equipment or property damage, it should be understood that operation
of damaged equipment could, under certain operational conditions, result in degraded
process performance leading to personal injury or death. Therefore, comply fully with
all warnings and caution notices.
6
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
7
SYS 600 9.3 MicroSCADA Pro 1MRS756796
3 General
This document is a security guide for MicroSCADA Pro Control System SYS 600 version
9.3 FP2 (hereafter SYS 600). The guide is intended for software and project engineers,
and system verification testers and they are expected to have general familiarity with
topics in the following areas:
• PCs, servers, and Windows operating systems
• Networking including TCP/IP and concept of ports and services
• Security policies
• Firewalls
• Anti-virus
• Application whitelisting
• Remote and secure communication
Operating systems (with the latest service packs) covered in this document are:
• Windows 7 Enterprise and Ultimate,
• Windows Server 2008 and 2008 R2,
• Windows XP Professional, or
• Windows Server 2003 Standard Edition
The guide assumes that in SYS 600 servers:
• Windows Update is disabled, e.g. WSUS used instead
• Uninterruptable Power Sources (UPS) is not controlled by the server
• Wireless network configuration is not used
• There are printers connected to the server
This guide assumes that in SYS 600 workplaces:
• Windows Update is disabled, e.g. WSUS used instead
• Wireless network configuration is not used
• There are printers connected to the workplace
However, the guide does not specify the network configuration (forests, domains,
organizational units (OU)) where the SYS 600 system is installed. There are several
ways to deploy security settings to machines, e.g. by using the secedit command-line
tool, the Security Configuration Wizard (SCW), or Group Policy Objects (GPO). This
guide gives instructions on how to deploy security settings to servers and workplaces
using the secedit tool.
This chapter gives general information, assumptions, and operating system and SYS 600
versions this guide covers. The system is secured by configuring the network, uninstalling
irrelevant software, disabling some Windows system services, configuring the firewall
settings, configuring application whitelisting, and applying security policies. Configuring
network is discussed in Chapter 4 Configuring network. Security settings in this document
are divided into the following categories:
• General security settings in Windows servers (Chapter 5 Configuring security settings
for Windows OS and SYS 600 Servers)
8
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
• Security settings in SYS 600 servers (Chapter 5 Configuring security settings for
Windows OS and SYS 600 Servers)
• Security settings in SYS 600 workplaces (Chapter 6 Configuring security settings
for SYS 600 Workplaces)
• Security features available in SYS 600 (Chapter 7 Configuring security features in
SYS 600)
There are security settings which are automatically configured in the product and those
which need to be configured manually. An administrator user account is created during
installation and a password is prompted for the MicroSCADA user. Since this is an
administrator user account, it is the responsibility of the system administrator to choose
a valid and secure password for this account.
Other Windows server security settings such as firewall, security policies and disabling
Windows system services are not automatically configured during the SYS 600
installation. This is due to fact that SYS 600 installation may conflict with existing
security settings on some computers where it is not allowed to modify these. To apply
security settings after SYS 600 installation, read and execute hardening script, see
Section A.1 Securing SYS 600 Server. The script files are located in the SYS 600
installation folder sc\setup\security.
There is general security guide for control systems and operating systems on the ABB
website [ABBSEC09]. Microsoft also has security guides for different operating systems
[MSSEC09].
9
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Security feature SYS 600 installa- SYS 600C SYS 600 9.3 and Remarks
tion later
OPC/DCOM settings for SYS 600 - S+M S+M See [SYSINS]
server-workplace
Firewall settings (ports and services) - X S+M Enable ports for used commu-
nication protocols according to
customer specifications.
Virtual Private Network (VPN) - X M
BIOS settings - X M
Removing unused programs - X M
Disabling system services - X S
SNMP - X M
Security policies - X S
Windows Update - M M Not installed/services disabled.
WSUS or manual installation
to be used instead. ABB is
verifying and testing latest
service packs and security up-
dates.
User Access Control (UAC) - X S
Application whitelisting - X S
Virus scanner - M M Installation manuals exist for
some virus scanner software
and ABB is also verifying and
testing virus definitions of
those.
Disabling devices
- DVD/CD-ROM drives - X S
- USB Mass Storage - X S
- Serial port - M M
- Floppy disk controller - M M
- Sound, video controller - M M
Disabling autorun functionality - X S
Backing up and restoring - M M
SYS 600 user management and au- - X M
thorization
10
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Term Description
NCC Network Control Center
OPC Open connectivity specification by OPC foundation
SCADA Supervisory Control and Data Acquisition
SCW Security Configuration Wizard
SSLF Specialized Security-Limited Functionality
SYS 600 MicroSCADA Pro Control System SYS 600
SYS 600C MicroSCADA Pro SYS 600C
TCP/IP Transmission Control Protocol/Internet Protocol
WSUS Windows Server Update Services
The default dynamic port range for TCP/IP has changed (Win-
dows 7 and Server 2008), Microsoft
11
SYS 600 9.3 MicroSCADA Pro 1MRS756796
12
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
4 Configuring network
Each host in a TCP/IP network has a unique identifier, called an IP address. The IP
address is composed of four numbers in the range from 0 to 255. The numbers are
separated with dots, e.g. 192.168.0.1. Because every computer on an IP network must
have a unique IP address, careful planning of IP addresses throughout the whole system
is important. You should remember to take care of the future needs in address areas when
planning large networks. A host can have multiple IP addresses, as shown in the
Figure 4.1. A static IP addressing should be used in SYS 600 system; see Configure a
Static IP Address and [SYSINS, Host names] for more information.
ABB does not recommend the use of domains and wireless networks in a SYS 600 system
due to the high reliability that is required of the control system. A domain controller that
is unavailable might affect to the stability of the control system. If a domain network is
used it is good to understand what are the risks in this solution. For more information,
see Active Directory Domain Services, Microsoft.
13
SYS 600 9.3 MicroSCADA Pro 1MRS756796
NCC Communication
This use case features the IP communication between SYS 600 and the NCC via a
dedicated wide area link, which can be a glass fiber optics communication link, a
microwave radio link, or a leased line that is not exposed to public access. The use of
IPSec/VPN technology ensures that the transmitted data is not readable to eavesdroppers
and vulnerable man-in-the-middle attacks. In addition, both SYS 600 and NCC can
authenticate using pre-shared keys before establishing the communication link.
14
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Figure 4.2 visualizes a possible setup for the use case. The VPN connections are illustrated
as blue tubes, and multiple SYS 600 devices are connected to the NCC system via the
operator’s internal IP network.
In case no network address translation (NAT) mechanism is used between SYS 600 and
NCC, IPSec can be run in transport mode, which encrypts all data of an IP packet but
leaves the IP header intact, which allows for fast delivery.
Maintenance Access via Remote Desktop Protocol (RDP)
An alternative access to SYS 600 is the use of the Remote Desktop Protocol (RDP).
RDP provides a graphical interface for SYS 600 on another computer. The RDP access
should be restricted to Intranet access only. Authentication is by conventional Windows
user login. RDP uses encryption to protect all transmitted data, but it is still recommended
to use IPSec/VPN for maintenance access also.
Note that the firewall must accept incoming RDP connections, and the maintenance
device connected to the VPN must be able to access SYS 600’s RDP port. As SYS 600
has access to the station bus, the service engineer connected to SYS 600’s desktop can
access the station bus via SYS 600’s desktop.
HSB communication
Another use case affects communication between a master SYS 600 device and its
redundant hot-standby-system via a wide area network connection. This link should be
protected against man-in-the-middle attacks by guaranteeing confidentiality, authenticity,
and authentication. This use case is comparable to NCC communication.
15
SYS 600 9.3 MicroSCADA Pro 1MRS756796
16
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Windows servers are protected with latest service packs and security updates, firewalls,
security policies, application whitelisting, and virus scanners. To reduce the attack surface
in servers, programs and services not used can also be uninstalled or disabled. See
Table 3.1 to check the security features automatically configured to the SYS 600. Some
SYS 600 versions need manual configuration.
Below sections use following statements “This has to be configured manually” and “This
is configured automatically”. The first statement means that security setting has to be
manually configured. The latter means that there is a script file to automate the
configuration process. This process is described in Securing SYS 600 Server.
17
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Configuration
A dedicated server, Microsoft Windows Server Update Services (WSUS), can be used
for updating servers and workplaces. For more detailed information, see [WSUS].
To manually get Windows security updates for the standalone server, Microsoft Update
Catalog can be used:
1. Check tested and verified security updates from patch compatibility report for
different operating systems.
2. Go to http://catalog.update.microsoft.com
3. Enter the bulletin ID mentioned in the patch compatibility report and the operating
system of the server to the search field, e.g. "MS12-055 Windows 2008 R2" and
press Search.
4. There might be several search results e.g. for different server architectures. Find the
correct security update for the architecture and press Add to add it to the basket.
5. Repeat steps 3 and 4 for each security update.
6. Click Show basket and the content of the basket is shown.
7. Click Download to save all security updates in the basket to the disk. Create a new
folder for the security updates e.g. 2012-10 indicating a year and a month of security
updates.
This has to be configured manually.
18
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
CPU Utilization
• Restrict CPU Utilization to 20%
• After modifying this setting it is recommended to run the on-demand scan to local
disks once to ensure that it finishes within an acceptable amount of time.
On-access scanning
• Scan only local disks, network scan is disabled (when each machine has its own
virus scanner).
• Disable email scans.
• In general, nothing should be excluded from scanning, but in case there are some
performance issues:
- SYS 600: <drive>\sc\apl\*.* (including subdirectories) are frequently used. If
this does not solve issues then exclude the whole sc directory.
- DMS 600: <drive>\DMS600\*.*
• Excluded files:
- Archive files such as .cab, .rar, and .zip
• Other settings
- Enable buffer overflow protection
- Enable access protection
19
SYS 600 9.3 MicroSCADA Pro 1MRS756796
20
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Patch management
It is recommended to update scan engine and virus definition files regularly. Verify that
the settings introduced above are preserved and the performance and functionality of the
system is acceptable after updates.
Theoretically, a new virus definition file could arrive that could compromise the proper
functionality of the system. Testing the system against every new virus definition file is
obviously not feasible. Therefore, we recommend full system backup before updating
virus definition files.
MicroSCADA Pro Portal contains manuals for installing McAfee and Symantec virus
scanners. The compatibility of SYS 600 product with the latest upgrades and virus
definitions is tested and verified monthly by ABB for some virus scanner programs. We
recommend that servers are updated according to MicroSCADA Pro SYS 600 Patch
Compatibility Report.
21
SYS 600 9.3 MicroSCADA Pro 1MRS756796
22
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
23
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Figure 5.4: Disabling USB Mass Storage Device, see also http://support.microsoft.com/kb/823732.
24
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
25
SYS 600 9.3 MicroSCADA Pro 1MRS756796
26
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
least 15 characters long [MSPASS09]. The password of the MicroSCADA user account
should not be changed through Windows User Management. Instead, SYS 600 Control
Panel > Admin > Password should be used where DCOM settings are automatically
configured.
By default, SYS 600C contains following Windows user accounts:
• MicroSCADA user (admin): This is used by the MicroSCADA service and should
not be used by interactive users.
• ScAdmin user (admin): This account should be used by the system administrator.
• ScEngineer, ScOperator, and ScViewer users (non-admin): These accounts are
disabled by default for security reasons.
• ScSysAdmins, ScEngineers, ScOperators, and ScViewers groups: Scripts configuring
other security areas such as Local security policy and application whitelisting are
based on these groups.
To configure these user accounts and groups automatically in SYS 600, the hardening
script has to be executed. To create new Windows user accounts, see Section 8.2 Adding
new Windows users. Do not give administrative rights (membership of Administrators)
to operators, viewers, and engineers. Only system administrators should have
administrative rights.
(http://www.microsoft.com/protect/fraud/passwords/create.aspx)
• An ideal password is long and has letters, punctuation,
symbols, and numbers.
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in your password,
the better.
• Use the entire keyboard, not just the letters and characters
you use or see most often.
27
SYS 600 9.3 MicroSCADA Pro 1MRS756796
We recommend that you back up the SYS 600 Server with disc imaging software (for
example Acronis True Image or Norton Ghost). The image should be saved to a network
drive or to a USB flash drive. Refer to the instructions from your disc imaging software
manufacturer on how to accomplish this.
Recommendations for image backup:
• SYS 600 Server – every 3 month,
• SYS 600 Workplace – every 6 month
This has to be done manually.
28
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
The method for restoring the disc image depends on the disc imaging software. Refer to
the instructions from your disc imaging software manufacturer on how to accomplish
this.
This has to be done manually.
29
SYS 600 9.3 MicroSCADA Pro 1MRS756796
It is not required to install SYS 600 software to SYS 600 Workplace machines at all. It
is enough that SYS 600 Workplace machine has software installed enabling a remote
connection to the SYS 600 Server. There are separate script files for hardening the
workplace machine, see Section A.2 Securing SYS 600 Workplace.
To operate the SYS 600 Server, a monitor (Monitor Pro or classic monitor) needs to be
opened. A monitor can be opened either on the server machine or through a remote
connection. If the SYS 600 Workplace is a remote machine, connection to the server
computer is established over the network by using the remote client. By default, the SYS
600 service is started in the server directly after Windows has been started. This is an
automatic startup of the service, i.e., no user needs to log in.
Promoted technology between the SYS 600 server and remote workplace computer is
Windows Remote Desktop Services. For more information about opening monitors, see
[SYSINS, Opening SYS 600 Monitor Pro].
30
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
uses MicroSCADA X and VS Remote monitor types (Classic monitors). Note that
technically, X Windows can use a range of ports between 6000 and 6063. In particular,
if the display number is changed from the default of 0 using Xconfig/Communications,
this will change the port that Exceed uses. If you change the display number to 1, it will
use 6001; if you change it to 2, it will use 6002, see Appendix B Ports and Services for
details
X Windows technology is not configured to the preconfigured firewall settings. You
will have to change your firewall settings manually if X windows is used.
This has to be configured manually.
31
SYS 600 9.3 MicroSCADA Pro 1MRS756796
This chapter lists security features, user account management and authorization, available
in SYS 600 product.
All settings in this chapter have to be configured manually.
32
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
(http://www.microsoft.com/protect/fraud/passwords/create.aspx)
• An ideal password is long and has letters, punctuation,
symbols, and numbers.
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in your password,
the better.
• Use the entire keyboard, not just the letters and characters
you use or see most often.
33
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Controlling events e.g. adding a comment is restricted based on user rights. Events are
stored in the file system in binary format.
For more information, see [SYSCON, Event and Alarm Handling].
7.7 Backdoors
The administrator password reset feature is enabled by default. ABB recommends that
this feature is permanently disabled before delivering the system to the customer. Using
this function requires system manager authority. Note that after the feature has been
disabled, it is no longer possible to login to the system if the user name or the password
of system manager has been lost.
To disable this feature:
1. Open Monitor Pro and select Tools > Engineering Tools > User Management.
2. Press Ctrl + R in the main window and confirm the operation.
3. A notification is shown that the feature has been disabled. If the feature has been
disabled before, this is also notified.
34
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
8 Maintenance
35
SYS 600 9.3 MicroSCADA Pro 1MRS756796
“SYS 600:“ and “DMS 600:” prefix is used in the rule names
to help finding settings.
36
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
When SYS 600 is upgraded, it might include updated hardening scripts. Running an
updated script will override all current settings. It is recommended to read release notes
to see modified sections.
37
SYS 600 9.3 MicroSCADA Pro 1MRS756796
8.7 Troubleshooting
When troubleshooting network problems, it is recommended to check firewall logs
(Windows Firewall: %windir%\pfirewall.log). It is also possible to disable firewall
temporarily to solve network problems. Windows event logs, especially Security,
Application, and System logs may have events related to security/access problems.
Windows AppLocker has a log, which can be accessed from Event Viewer >
Applications and Services Logs > Microsoft > Windows > AppLocker and there it
is possible to find which applications are blocked. AppLocker can also be set to Audit
Only mode meaning that applications are allowed to run and the log contains events if
the application would have been blocked if the rules were enforced.
38
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
This section describes how to configure computers (servers and workplaces) used in
SYS 600 control systems in simple steps. It is recommended to deploy security settings
right after installing SYS 600 software. This is to reduce the risk of having malware
planted to the system in the engineering phase.
ABB recommends that basic security steps are taken to secure all computers in the system.
SYS 600 installation includes script files for configuring following security areas in the
computer:
• Windows users and groups: ScAdmin, ScEngineer, ScOperator, and ScViewer
users and respective groups are created. Configurations of other security areas are
based on these. Non-admin user accounts are automatically created.
• Firewall: Firewall is enabled and SYS 600 and DMS 600 specific ports are
preconfigured
• Local security policy: Hardens the computer with Password policy, Account policy,
System services etc.
• File system permissions: Restricts user access to sc folder and assigns permissions
for non-admin user accounts automatically.
• Application whitelisting: AppLocker is enabled and configured
39
SYS 600 9.3 MicroSCADA Pro 1MRS756796
40
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
These programs are normally found in the desktop operating systems such as Windows
XP and Windows 7.
41
SYS 600 9.3 MicroSCADA Pro 1MRS756796
A.3 Rollback
Hardening scripts take a backup of firewall settings and these can be found from
sc\setup\security\backup folder after running the hardening script. There are also other
backup files depending on the operating system. It is also possible to manually take a
backup of local security policies.
In case system does not work as expected, these are the instructions for the rollback.
Run these commands with admin rights.
Windows XP/Server 2003
1. netsh firewall reset
a. Open Control Panel > Windows Firewall and verify that Windows Firewall
is on and that File and Print Sharing is allowed.
2. secedit /configure /cfg %windir%\repair\secsetup.inf /db
secsetup.sdb /verbose /log rollback.log
3. Open Control Panel > Administrative Tools > Local Security Policy > Security
Settings > Local Policies > User Rights Assignment.
4. Set Log on as service and Log on as a batch job to value MicroSCADA and confirm
changes.
5. Close Local Security Policy.
Windows 7/Server 2008
1. netsh advfirewall reset
a. Open Control Panel > Windows Firewall and verify that Windows Firewall
is on and that File and Print Sharing is allowed.
2. secedit /configure /cfg %windir%\inf\defltbase.inf /db
defltbase.sdb /verbose /log rollback.log
3. Open Control Panel > Administrative Tools > Local Security Policy > Security
Settings > Local Policies > User Rights Assignment.
4. Set Log on as service and Log on as a batch job to value MicroSCADA and confirm
changes.
42
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
43
SYS 600 9.3 MicroSCADA Pro 1MRS756796
44
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
45
SYS 600 9.3 MicroSCADA Pro 1MRS756796
46
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Inbound (listening)
Service: UDP: TCP: Inbound Port number Port status open al- Used by
port num- fixed/configur- ways/configurable
ber able
ELCOM-90 Ad- X 6999 configurable configurable
min
Opcs_iec61850.exe - - - - IEC 61850 OPC Server, which
contains SNTP Server as
TCP/IP Server. See ntp ser-
vice.
Opcs_iec61850.exe - 102 fixed configurable IEC 61850 OPC Client / IEC
61850 System Supervision
Server, which contains MMS
Server as TCP/IP server
47
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Inbound (listening)
Service: UDP TCP: Inbound Port number Port status open al- Used by
port num- fixed/configur- ways/configurable
ber able
CaCe Fault Re- X 8086 Configurable (Only fileserver)
ceiver, TE CaCe
PowerGrid X 3000 Fixed Configurable Optional, depending customer
Server, PG license / needs.
Server TECS-
service
AMR (http) X 80 - Configurable
AMR (https) X 443 - Configurable
48
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Windows system services are described in detail in Threats and Countermeasures Guides.
The guide also includes the Excel workbook “Windows Default Security and Services
Configuration”, which documents the default startup settings for services.
The settings below are a collection of services which are automatically disabled, using
the script, in Windows XP, Windows Server 2003, Windows 7, and Windows Server
2008.
Not all services are running in each operating system, and may
not even exist. The script is built so that it ignores the
unavailable services and therefore it is normal to have these
kinds of messages in the log file:
• Error 1060: The specified service does not exist as an
installed service. Error opening <service name>.
• Error 1060: The specified service does not exist as an
installed service. Opening service <service name> for stop
access failed.
• Legacy audit settings are disabled. Skipped configuration
of legacy audit settings.
Some functionality needs certain services to be enabled. To enable some feature, see
Section 8.5 Adding Windows features.
Table C.1: Disabled Windows system services
Service Display Name
Alerter Alerter
aspnet_state ASP .NET State Service
AudioSrv Windows Audio
CiSvc Indexing Service
ClipSrv ClipBook
Fax Fax
Helpsvc Help and Support
IISAdmin IIS Admin
ImapiService IMAPI CD-Burning COM Service
Messenger Messenger
Mnmsrvc NetMeeting Remote Desktop Sharing
MSFtpsvc FTP Publishing Service
RDSessMgr Remote Desktop Help Session Manager Service
SCardSvr Smart Card
49
SYS 600 9.3 MicroSCADA Pro 1MRS756796
50
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
The table below shows what settings are changed in the SYS 600 servers and workplaces
compared to the default, domain, and member server settings.
Note! The default value is the operating system default value. There is a separate default
value for SSLF settings not shown here.
Table D.1: SYS 600 security policies
Setting:Name Default Value Win2k8- Win2k8- Remarks
SYS600Serv- SYS600Work-
er:Value place:Value
Maximum pass- 42 days 0 Not defined MicroSCADA user
word age account never ex-
pires
Minimum pass- 0 days 0 Not defined MicroSCADA user
word age account never ex-
pires
Account lockout 0 invalid logon at- 0 0 Denial-of-service
threshold tempts attack is possible
if this value is
more than zero.
Therefore, never
lockout.
Debug programs Administrators Administrators Not defined
Deny access to guests Guests, ANONYM- Not defined
this computer OUS LOGON
from the network
Allow log on Administrators, Re- Administrators, Re- Not defined
through Terminal mote Desktop mote Desktop
Services Users Users
Deny log on loc- Guests Guests, Micro- Not defined MicroSCADA user
ally SCADA account is only
used to running
the service
Deny log on Not defined Guests, Micro- Not defined MicroSCADA user
through Terminal SCADA account is only
Services used to running
the service
Log on as a ser- Not defined MicroSCADA Not defined
vice
Accounts: Re- Guest Guestrenamed Guestrenamed Guest account is
name guest ac- disabled, however
count still renaming
Accounts: Re- Administrator ScAdmin Not defined Administrator user
name built-in Ad- name cannot be
ministrator ac- used to login to
count Windows any-
more.
51
SYS 600 9.3 MicroSCADA Pro 1MRS756796
52
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
Applocker rules are implemented for ScEngineers, ScOperators and ScViewers. Users
being member of ScSysAdmins group are also members of Administrators group and
this is why there are no rules for ScSysAdmins group. Administrators group has full
access to all applications. Rules that are defined for ScOperators group are also given
to ScViewers, and ScEngineers groups. ScEngineers group has some extra rules needed
for engineering.
Note that Everyone is allowed to execute applications in the Windows and Program Files
folders but there are exceptions: cmd.exe, regedit.exe, regedt32.exe, and regsvr32.exe.
53
SYS 600 9.3 MicroSCADA Pro 1MRS756796
54
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
The configuration for Windows Server 2003 is shown below. Server 2008 is not much
different.
2. Right-click IP Security Policies on Local Computer, and then click Create IP Security
Policy.
3. Click Next, and then type a name for your policy (for example, IPSec Tunnel with
Network Control Center).
55
SYS 600 9.3 MicroSCADA Pro 1MRS756796
4. Click to clear the Activate the default response rule check box, and then click
Next.
5. Add additional information in the Description box if desired. Click Next.
56
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
57
SYS 600 9.3 MicroSCADA Pro 1MRS756796
4. Type an appropriate name for the filter list (e.g., IP traffic to NCC), click to clear
the Use Add Wizard check box, and then click Add.
5. In the Source address box, click A specific IP Address, and then type the IP
Address of SYS600 towards NCC (the IP address that communicates with the NCC),
as this filter should only apply to the network interface connected to the WAN.
58
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
6. In the Destination address box, click A specific IP Address, and then type the IP
Address of the NCC (the NCC’s IP address that SYS600 connects to).
7. Leave the Mirrored check box selected.
8. Click the Protocol tab. Make sure that the protocol type is set to Any, because IPSec
does not support protocol-specific or port-specific filters.
59
SYS 600 9.3 MicroSCADA Pro 1MRS756796
9. If you want to type a description for your filter, click the Description tab. Click
OK.
10. Click OK to close IP Filter List dialog
2. Click the Tunnel Setting tab, click This rule does not specify an IPSec tunnel.
3. Click the Connection Type tab, click Local area network (LAN)
4. Click the Filter Action tab, click on one of the following options, depending on the
decision of how to handle non-IPSec traffic:
• Permit – Permits unsecured IP packets to pass through.
• Request Security (Optional) – Accepts unsecured communication, but requests
clients to establish trust and security methods. Will communicate insecurely to
untrusted clients if they do not respond to request.
• Require Security – Accepts unsecured communication, but always requires
clients to establish trust and security method. Will NOT communicate with
untrusted devices.
60
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
61
SYS 600 9.3 MicroSCADA Pro 1MRS756796
Repeat the steps for all machines that should use IPSec. It is possible to export and import
the policies on a different computer. Here are the instructions:
1. a. In the Local Security Settings, where the VPN configuration is set, select IP
Security Policies on Local Computer.
b. Select Action > All Tasks > Export Policies... and write a file name.
c. In the other computer, where VPN configuration is needed: open Local Security
Settings and select select IP Security Policies on Local Computer.
d. Select Action > All Tasks > Import Policies…
62
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
63
SYS 600 9.3 MicroSCADA Pro 1MRS756796
The following excerpt is taken from Supervisory Control and Data Acquisition (SCADA)
Systems, NATIONAL COMMUNICATIONS SYSTEM, October 2004, www.ncs.gov.
In today’s corporate environment, internal networks are used for all corporate
communications, including SCADA. SCADA systems are therefore vulnerable to many
of the same threats as any TCP/IP-based system.
Security in an industrial network can be compromised in many places along the system
and is most easily compromised at the SCADA host or control room level. SCADA
computers logging data out to some back-office database repositories must be on the
same physical network as the back-end database systems, or have a path to access these
database systems. This means that there is a path back to the SCADA systems and
eventually the end devices through their corporate network. Once the corporate network
is compromised, then any IP-based device or computer system can be accessed. These
connections are open 24x7 to allow full-time logging, which provides an opportunity to
attack the SCADA host system with any of the following attacks:
• Use a Denial of Service (DoS) attack to crash the SCADA server, leading to a
shutdown condition (System Downtime and Loss of Operations)
• Delete system files on the SCADA server (System Downtime and Loss of Operations)
• Plant a Trojan and take complete control of system (Gain complete control of system
and be able to issue any commands available to Operators)
• Log keystrokes from Operators and obtain usernames and passwords (Preparation
for future take down)
• Log any company-sensitive operational data for personal or competition usage (Loss
of Corporate Competitive Advantage)
• Change data points or deceive Operators into thinking control process is out of
control and must be shut down (Downtime and Loss of Corporate Data)
• Modify any logged data in remote database system (Loss of Corporate Data)
• Use SCADA Server as a launching point to defame and compromise other system
components within corporate network.
For a company to protect its infrastructure, it should undertake the development of a
security strategy that includes specific steps to protect any SCADA system. Such a
strategy may include the following approach.
Developing an appropriate SCADA security strategy involves analysis of multiple layers
of both the corporate network and SCADA architectures including firewalls, proxy
servers, operating systems, application system layers, communications, and policy and
procedures. Strategies for SCADA Security should complement the security measures
implemented to keep the corporate network secure.
The figure below illustrates the typical corporate network “ring of defenses” and its
relationship with the SCADA network. Successful attacks can originate from either
Internet paths through the corporate network to the SCADA network, or from internal
attacks from within the corporate office. Alternatively, attacks can originate from within
the SCADA network from either upstream (applications) or downstream (RTUs) paths.
64
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
What is an appropriate configuration for one installation may not be cost-effective for
another. Flexibility and the employment of an integrated and coordinated set of layers
are critical in the design of a security approach.
65
SYS 600 9.3 MicroSCADA Pro 1MRS756796
passwords that are not based on a dictionary word and contain at least one symbol,
capital letter, and number, and should be over eight characters long. Users should
not be allowed to use the name of their spouse, child or pet as their password.
The above list is common to all entities that have corporate networks. SCADA systems
for the most part coexist on the same corporate network, as seen in the figure above. The
following list suggests ways to help protect the SCADA network in conjunction with
the corporate network:
• SCADA Firewalls SCADA Systems and Industrial Automation Networks, like
corporate network operating systems, can be compromised using similar hacking
methods. SCADA systems frequently go down due to other internal software tools
or employees who gain access to the SCADA systems, often without any intention
to take down these systems. For these reasons, it is suggested that strong firewall
protection to wall off your SCADA networking systems from both the internal
corporate network and the Internet be implemented. This would provide at least two
layers of firewalls between the SCADA networking systems and the Internet.
• SCADA Internal Network Design SCADA networks should be segmented off
into their own IP segment using smart switches and proper sub-masking techniques
to protect the Industrial Automation environment from the other network traffic,
such as file and print commands. Facilities using Wireless Ethernet should use
sufficient encryption, e.g. WPA or WPA2.
• SCADA Server Operating Systems Merely installing a firewall or segmenting
SCADA IP addresses will not ensure their SCADA Infrastructure is secure. An
experienced hacker can often bypass firewalls with ease and can even use Address
Resolution Protocol (ARP) trap utilities to steal Media Access Control (MAC)
addresses. The hacker can also deploy IP spoofing techniques to maneuver through
switched networks. Operating systems running the SCADA applications must also
be maintained. SCADA applications on Windows NT, 2000, or XP are properly
patched against the latest vulnerabilities, and all of the default NULL NT accounts
and administrator accounts have been removed or renamed. SCADA applications
running on UNIX, Linux, Novell, or any other operating system (OS), must also be
maintained as above. All operating systems have back doors and default access
accounts that should be removed and cleaned off of these SCADA servers.
• SCADA Applications One must also address security within the SCADA
application itself. Trojan horses and worms can be inserted to attack application
systems, and they can be used to manipulate data or issue commands on the server.
There have even been cases of Trojan horses being deployed that completely emulate
the application. The operator or user thinks that he is clicking on a command to stop
a pump or generate a graph of the plant, but he is actually clicking on buttons
disguised to look like the SCADA screen, and these buttons start batch files that
delete the entire hard drive, or send out pre-derived packets on the SCADA system
that turn all outputs to the ON or “1” state. Trojan horses and viruses can also be
planted through an email opened by another computer in the network, and then it is
silently copied over to adjacent SCADA servers, where they wait until a specified
time to run. Plant control rooms will often have corporate computers with the Internet
and email active on them, within the same physical room and on the same network
switches as SCADA computers. Methodologies to mitigate against these types of
situations are: the use of anti-virus software running on the computer where the
66
1MRS756796 MicroSCADA Pro SYS 600 9.3
Issued: 31.3.2010 Cyber Security Deployment Guideline
Version: C/30.9.2012
67
Contact us
www.abb.com/substationautomation