MicroSCADA X - Security Guide
MicroSCADA X - Security Guide
Table of contents
Section 1 Copyrights......................................................................................................5
Section 2 Introduction....................................................................................................7
2.1 This manual...........................................................................................................................7
2.2 Use of symbols......................................................................................................................7
2.3 Intended audience.................................................................................................................7
2.4 Document conventions..........................................................................................................7
2.5 Document revisions...............................................................................................................8
Section 3 General........................................................................................................... 9
3.1 Definitions and Abbreviations..............................................................................................12
3.2 Reference Documents.........................................................................................................12
MicroSCADA X 1
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Table of contents 1MRK 511 574-UEN Rev. A
2 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Table of contents
MicroSCADA X 3
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
4
1MRK 511 574-UEN Rev. A Section 1
Copyrights
The information in this document is subject to change without notice and should not be construed as
a commitment by Hitachi Energy. Hitachi Energy assumes no responsibility for any errors that may
appear in this document.
In no event shall Hitachi Energy be liable for direct, indirect, special, incidental or consequential
damages of any nature or kind arising from the use of this document, nor shall Hitachi Energy be
liable for incidental or consequential damages arising from the use of any software or hardware
described in this document.
This document and parts thereof must not be reproduced or copied without written permission from
Hitachi Energy, and the contents thereof must not be imparted to a third party nor used for any
unauthorized purpose.
The software or hardware described in this document is furnished under a license and may be used,
copied, or disclosed only in accordance with the terms of such license.
Trademarks
ABB is a registered trademark of ABB Asea Brown Boveri Ltd. Manufactured by/for a Hitachi Energy
company. All other brand or product names mentioned in this document may be trademarks or
registered trademarks of their respective holders.
Guarantee
Please inquire about the terms of guarantee from your nearest Hitachi Energy representative.
List of Third Party Copyright notices are documented in "3rd party licenses.txt" and other locations
mentioned in the file in SYS600 and DMS600 installation packages.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(https://www.openssl.org/). This product includes cryptographic software written by Eric Young
([email protected]). This product includes software written by Tim Hudson ([email protected]).
This product includes software developed by Computing Services at Carnegie Mellon University
(http://www.cmu.edu/computing/).
MicroSCADA X 5
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
6
1MRK 511 574-UEN Rev. A Section 2
Introduction
This document is a cyber security guide for MicroSCADA X Control System SYS600 (hereafter
SYS600) and MicroSCADA X Distribution Management System DMS600 (hereafter DMS600). See
product versions from Section 2.5.
There are quick configuration instructions at the end of this document to configure server and
workplace in easy steps, see Appendix A. The major part of the configuration can be done
automatically with a security configuration tool, Security Compliance Manager (SCM).
The installation package for the SCM tool can be downloaded from the MicroSCADA partner portal.
This publication includes warning, caution and information symbols where appropriate to point out
safety-related or other important information. It also includes tips to point out useful hints to the
reader. The corresponding symbols should be interpreted as follows:
Warning icon indicates the presence of a hazard which could result in personal
injury.
Tip icon indicates advice on, for example, how to design a project or how to use a
certain function.
Although warning hazards are related to personal injury, and caution hazards are associated with
equipment or property damage, it should be understood that operation of damaged equipment could,
under certain operational conditions, result in degraded process performance leading to personal
injury or death. Therefore, comply fully with all warnings and caution notices.
This manual is intended for installation personnel, administrators and skilled operators to support
installation of the software.
MicroSCADA X 7
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 2 1MRK 511 574-UEN Rev. A
Introduction
• The words in names of screen elements (for example, the title in the title bar of a dialog, the
label for a field of a dialog box) are initially capitalized.
• Capital letters are used for file names.
• Capital letters are used for the name of a keyboard key if it is labeled on the keyboard. For
example, press the CTRL key. Although the Enter and Shift keys are not labeled they are written
in capital letters, for example, press ENTER.
• Lowercase letters are used for the name of a keyboard key that is not labeled on the keyboard.
For example, the space bar, comma key and so on.
• Press CTRL+C indicates that the user must hold down the CTRL key while pressing the C key
(in this case, to copy a selected object).
• Press ALT E C indicates that the user presses and releases each key in sequence (in this case,
to copy a selected object).
• The names of push and toggle buttons are boldfaced. For example, click OK.
• The names of menus and menu items are boldfaced. For example, the File menu.
• The following convention is used for menu operations: Menu Name/Menu Item/
Cascaded Menu Item. For example: select File/Open/New Project.
• The Start menu name always refers to the Start menu on the Windows Task Bar.
• System prompts/messages and user responses/input are shown in the Courier font. For
example, if the user enters a value that is out of range, the following message is displayed:
Entered value is not valid.
The user may be told to enter the string MIF349 in a field. The string is shown as follows in the
procedure: MIF349
• Variables are shown using lowercase letters: sequence name
8 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 3
General
This document is a security guide for MicroSCADA X Control System SYS600 and MicroSCADA X
Distribution Management System DMS600. The guide is intended for software and project engineers,
and system verification testers and they are expected to have general familiarity with topics in the
following areas:
Operating systems (with the latest service packs) covered in this document are:
• Server operating systems: Windows Server 2012 R2, 2016, 2019, 2022
• Desktop operating systems: Windows 8.1, 10
• For Windows 10 installations, it is recommended to use LTSB/LTSC versions
However, the guide does not specify the network configuration where the MicroSCADA X system is
installed. The network architecture may be built around Active Directory, or it may utilize workgroup
computers not joined to any domain.
This section provides general information as well as information on assumptions, operating systems
and MicroSCADA X versions this guide covers. The system is secured by configuring the network,
uninstalling irrelevant software, disabling some Windows system services, configuring the firewall
settings, configuring application allowlisting, and applying security policies. Configuring network is
discussed in Section 5. Security settings in this document are divided into the following categories:
There are security settings that are automatically configured in the product and those that need to be
configured manually. For example, a Windows administrator user account is created during SYS600
installation and a password is prompted for the MicroSCADA user. Since this is an administrator user
account, it is the responsibility of the system administrator to choose a valid and secure password for
this account.
MicroSCADA X 9
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 3 1MRK 511 574-UEN Rev. A
General
Other Windows server security settings such as firewall, security policies and disabling Windows
system services are not automatically configured during the SYS600 or DMS600 installation. This is
due to fact that the installation may conflict with existing security settings on some computers where
it is not allowed to modify these. To apply security settings, such as firewall rules, security policies
and disabling unused Windows system services, after MicroSCADA X product installation, run a
security configuration tool, Security Compliance Manager (SCM), see Appendix A 1.2.
There is general security guide for control systems and operating systems on the Hitachi Energy
Cybersecurity website [SEC]. Microsoft also has security guides for different operating systems
[MSSEC09].
• Activate pre-configured Windows user accounts that are meant for operators
and engineers (ScOperator etc.)
• Open Windows Firewall ports for the used communication protocols (Appendix
B)
• If there are new applications installed, these should be allowed to run in
Windows AppLocker (Appendix E)
10 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 3
General
MicroSCADA X 11
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 3 1MRK 511 574-UEN Rev. A
General
Table 2: Terminology
Term Description
DCOM Distributed Component Object Model
NCC Network Control Center
OPC Open connectivity specification by OPC foundation
SCADA Supervisory Control and Data Acquisition
SCM Security Compliance Manager, a security configuration tool
SCW Security Configuration Wizard
SYS600 MicroSCADA X Control System SYS600
SYS600C MicroSCADA X SYS600C
DMS600 MicroSCADA X Distribution Management System DMS600
TCP/IP Transmission Control Protocol/Internet Protocol
WSUS Windows Server Update Services
MicroSCADA X Product family including SYS600 and DMS600
Table 3: References
12 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 4
Secure installation of MicroSCADA X SYS600 / DMS600 - Step-by-step Guide
This chapter describes step-by-step the process for installing MicroSCADA X SYS600 / DMS600
securely. The process starts from the architectural design and ends when the system can be given
for the engineering unit to create the actual SCADA configuration. This chapter is also kind of a
checklist, which can be referenced when making the architectural decisions or the actual installation
project for the MicroSCADA X system.
Instructions in this chapter are concise on purpose, but they are referencing to other relevant manual
sections and manuals where necessary. Reading the whole manual is mandatory to get good
understanding of the security landscape around MicroSCADA X systems, this chapter alone is not
enough for that.
The following topics should be handled with due care before starting the actual installation process.
These may sound trivial, but they are the base for a secure MicroSCADA environment. Even when
the actual installation and configuration phase is handled correctly, but the network segmentation
does not follow the security requirements for the particular environment, the security level is not so
high as it could be.
Not all environments require all these components, and many environments require also additional
components, but the list covers things which are often found in different types of MicroSCADA
environments.
MicroSCADA X 13
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 4 1MRK 511 574-UEN Rev. A
Secure installation of MicroSCADA X SYS600 / DMS600 - Step-by-step Guide
1.2. Network
a High availability
a External
b Internal
b Proper segmentation
c VLANs & subnets
d Firewalls between different network segments (IT, DMZ, AD, Backup, SCADA, field
devices, etc)
a Port openings between different networks
b IDS / IPS configuration
e NTP & DNS
f Active Directory & requirements, if AD is used
1.3. User account policies
a Local
b Centrally managed
a Active Directory
b SDM600
c Role definitions and plans
a Admins for various systems
a Not all admins need full admin access rights for every system!
b Engineers
c Operators
d Viewers / Read only
14 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 4
Secure installation of MicroSCADA X SYS600 / DMS600 - Step-by-step Guide
GUID-DAB7BAA7-F482-479F-951E-DAC3AA9B856E V1 EN-US
2. Gather at least the following information before proceeding to the next chapter
2.1. Relevant network configuration
a IP addresses (including netmasks and gateways)
b Hostnames
c NTP server address
d External DNS server addresses
e Required network shares
f Printer addresses
g External servers & gateways
2.2. User accounts + passwords
This chapter does not cover actual Windows installation or network configuration processes. Please
refer to Microsoft documentation regarding the former and your OT/SCADA network team regarding
the latter topic.
At this point it is assumed that the network is configured properly, all required operating systems are
installed, and operating systems are updated according to the latest MicroSCADA Patch
Compatibility report.
The steps here are divided in two parts, one part is required to be done for all individual MicroSCADA
servers, and the other is done either for all when the environment type is standalone one or centrally
in other cases.
The following security related configurations are managed with the SCM tool, and they must be
handled via group policies in Domain environments
• Application Allowlisting
MicroSCADA X 15
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 4 1MRK 511 574-UEN Rev. A
Secure installation of MicroSCADA X SYS600 / DMS600 - Step-by-step Guide
1. Verify that all the required user accounts are created, and they belong to the correct user groups
1.1. Verify user accounts also for the SQL Server
2. Document users and groups carefully
1. Verify that NTP is functioning properly, as correct time is crucial for MicroSCADA usage
2. Verify host firewall rules
2.1. If SCM is used for enforcing the security configuration, disable/remove all those firewall
rules, which are not needed.
3. Go through following chapters, and verify that the configuration matches the recommended
settings
3.1. Section 6
3.2. Section 7
3.3. Section 8
4. When you are configuring SYS600, check chapter 6.2.7. "SYS objects for base system - Basic
SYS attributes - Security attributes" in 1MRS257860 – SYS600 System Objects document and
verify that all SYS600 related security configurations are correct for that environment as planned
in the architectural phase of the project.
16 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 5
Configuring network
Each host in a TCP/IP network has a unique identifier, called an IP address. The IP address is
composed of four numbers in the range from 0 to 255. The numbers are separated with dots, for
example, 192.168.0.1. Because every computer on an IP network must have a unique IP address,
careful planning of IP addresses throughout the whole system is important. Make sure to take care of
the future needs in address areas when planning large networks. A host can have multiple IP
addresses, as shown in the Figure 1. A static IP addressing should be used in SYS600 system; see
Configure a Static IP Address and [SYSINS, Host names] for more information.
Wireless networks are not recommended in a SYS600 system due to the high reliability that is
required of the control system.
GUID-B0D5104D-750D-431F-B742-252BAA20B024 V1 EN-US
MicroSCADA X products do not use IPv6. To disable IPv6 on network adapter, open
Network and Sharing Center, select Change adapter settings, select a network
adapter and right-click for properties, uncheck the box for Internet Protocol Version
(TCP/IPv6) and then click OK.
In corporate office networks Active Directory is often used for managing users and configuration
centrally. SCADA/ICS environments have been a bit different in the past, as Active Directory adds
MicroSCADA X 17
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 5 1MRK 511 574-UEN Rev. A
Configuring network
more complexity to the architecture, more servers which need to be installed & administered, and
more locations which can break down.
If the environment requires central user management and other things provided by Active Directory,
the architecture of the system must be designed accordingly. High availability must be taken into
account, and that affects both the server and network architecture. It is not recommended to rely only
on one domain controller, as it is then single point of failure in the authentication architecture.
It is not recommended at all to join MicroSCADA related computers to the office/enterprise Active
Directory, as this will cause unexpected issues when configurations are applied to the office Active
Directory.
Separate Active Directory for the MicroSCADA environment is the recommended solution. It is better
regarding security, as the accounts are used only for logging to the servers in the MicroSCADA
environment and they are not shared between the MicroSCADA environment and the corporate
office environment. It is also better as all configuration and security settings are related to the
MicroSCADA environment, and thus there is not so big risk that accidentally some problematic
setting is applied to all computers by a person who does not understand the specific requirements of
the MicroSCADA environment.
This guideline considers the IP communication between SYS600 server and the Network Control
Center (NCC) / Regional Control Center (RCC) via a dedicated wide area link that is not exposed to
public access. The use case is to protect the dedicated link against man-in-the-middle attacks by
guaranteeing confidentiality, integrity, and authentication via IPSec, using pre-shared key
authentication. These instructions are also applicable to DMS600 systems.
The IPSec configuration must be done on all machines that should communicate with each other by
IPSec. The configuration is shown in Appendix F.
IPSec encryption is a CPU consuming activity that can affect the maximum
throughput and the CPU utilization. In order to determine the effect of IPSec
encryption for data throughput and CPU consumption, it is important verify this with
tests.
This use case features the IP communication between SYS600 and the NCC via a dedicated wide
area link, which can be a glass fiber optics communication link, a microwave radio link, or a leased
line that is not exposed to public access. The use of IPSec/VPN technology ensures that the
transmitted data is not readable to eavesdroppers and vulnerable man-in-the-middle attacks. In
addition, both SYS600 and NCC can authenticate using pre-shared keys before establishing the
communication link.
18 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 5
Configuring network
GUID-9999A402-4D5C-4212-9302-B1C26DA97283 V1 EN-US
In case no network address translation (NAT) mechanism is used between SYS600 and NCC, IPSec
can be run in transport mode, which encrypts all data of an IP packet but leaves the IP header intact,
which allows for fast delivery.
An alternative access to SYS600 is the use of the Remote Desktop Protocol (RDP). RDP provides a
graphical interface for SYS600 on another computer. The RDP access should be restricted to
Intranet access only. Authentication is done by conventional Windows user login. RDP uses
encryption to protect all transmitted data, but it is still recommended to also use IPSec/VPN for
maintenance access.
GUID-B984BF03-CBF7-4009-BA49-84AAE7F859A0 V1 EN-US
MicroSCADA X 19
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 5 1MRK 511 574-UEN Rev. A
Configuring network
Another use case affects communication between a master SYS600 device and its redundant hot-
standby-system via a wide area network connection. This link should be protected against man-in-
the-middle attacks by guaranteeing confidentiality, authenticity, and authentication. This use case is
comparable to NCC communication.
GUID-FE344F92-B17D-4235-9D2F-1D5C5A6ABC02 V1 EN-US
Network devices, such as switches, routers, firewalls, intrusion detection systems, modems, and
wireless devices, are not part of this security guide. From a security point of view, these devices
should be enabled for the following features:
• Logging
• Patches / Updates
• Backup / Recovery
20 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
Windows servers are protected with latest service packs and security updates, firewalls, security
policies, application allowlisting, and virus scanners. To reduce the attack surface in servers,
programs and services not used can also be uninstalled or disabled. See Table 1 to check the
security features automatically configured to the server. Some products need manual configuration.
Each of the sections below ends with either "This has to be configured manually" or "This is
configured automatically". The first statement means that security setting has to be manually
configured. The latter means that there is a security configuration tool to automate the configuration
process. This process is described in Appendix A 1.2.
Manual configuration of the listed items is needed, and the exact way to do it depends on the used
computer hardware. Please consult your computer manual if unsure how BIOS settings can be
changed.
BitLocker is a full disk encryption feature found on Windows systems. In addition to disk encryption,
BitLocker verifies the system integrity during startup of the computer. The computer must have TPM
(Trusted Platform Module) chip to fully utilize the security functionality provided by BitLocker.
Disk encryption is not so often needed in MicroSCADA systems, because computer hardware is
usually located in places which are physically secured. Verification of the system integrity is much
more important topic, but it is not possible to have only system integrity verification without disk
encryption.
BitLocker causes some degradation of disk I/O performance. Depending on the environment,
hardware and workload it can be anything from a couple of percents to worst case tens of percents.
Write operations are affected much more, so real life results are really dependant on the actual
environment and its requirements. Also the servers today have often enough spare CPU capacity
and thus the degraded performance is an issue only in rare cases.
Usage of BitLocker is recommended, but the effects of its performance requirements must be
analyzed thoroughly.
When BitLocker is used, the secure storage of BitLocker recovery keys must be planned in
advanced.
MicroSCADA X 21
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
DEP is a security feature that can help prevent damage to the user's computer from viruses and
other security threats. DEP can help protect the user's computer by monitoring programs to make
sure they use system memory safely. If a program tries running (also known as executing) code from
memory in an incorrect way, DEP closes the program. DEP automatically monitors essential
Windows programs and services. [MSDEP]
The following software is not used by SYS600 and DMS600 and can be manually removed from
Windows through Control Panel (current Windows versions). These programs are normally found on
desktop operating systems, such as Windows 10. On server operating systems, these are disabled
by default.
Windows Component
Windows Media Player / Media Features Remove manually
Games Remove manually
Windows Defender (in Windows 10 only when a 3rd party Remove manually, and uncheck Windows Defender
security program is used) > Settings > Administrator > Turn on this app.
More details in section Virus scanner.
Microsoft Office In some customer systems, Microsoft Office is
installed. Remove features such as PowerPoint and
Outlook from installation. Only leave features that are
actually used, for example, Excel and Word. See
Office documentation how to uninstall individual
components from full installation.
There are nine update classifications defined by Microsoft. These include, for example, critical
updates, drivers, security updates and service packs. The compatibility of MicroSCADA X products
with the latest Microsoft security updates and service packs is tested and verified monthly. The test
results can be found from the partner portal if you are a certified system integrator or if you are an
end user, these reports can be made available to you based on your service agreement. The reports
do not cover workplace computers but it is recommended to install all updates.
Windows Update only gets updates for Windows operating system. MicroSCADA X products are
using other Microsoft products such as SQL Server and therefore, Microsoft Update should be used
instead. See the Figure 5 to start getting updates for other products also.
22 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
GUID-C24D609A-757A-40BB-9915-2F6EB4A98258 V1 EN-US
GUID-E3CC1A60-30B5-4F4D-B6C0-EF582F449ED2 V1 EN-US
A dedicated server, Microsoft Windows Server Update Services (WSUS), can be used for updating
servers and workplaces. For more detailed information, see [WSUS].
MicroSCADA X 23
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
To manually get Windows security updates for the standalone server, Microsoft Update Catalog can
be used:
1. Check tested and verified security updates from MicroSCADA X Patch Compatibility Reports
(linked above) for different operating systems.
2. Go to http://catalog.update.microsoft.com
3. Enter the bulletin ID mentioned in the patch compatibility report and the operating system of the
server to the search field, for example, "4530715 Windows 2019" and press Search.
4. There might be several search results, for example, for different server architectures. Find the
correct security update for the architecture and press Add to add it to the basket.
5. Repeat steps 3 and 4 for each security update.
6. Click Show basket and the content of the basket is shown.
7. Click Download to save all security updates in the basket to the disk. Create a new folder for
the security updates, for example, 2019-12 indicating a year and a month of security updates.
Whenever it cannot be guaranteed that unknown software is not executed on a machine (for
example, due to enabling of removable devices or USB ports), the use of anti-virus software is highly
recommended on servers, workstations, and maintenance laptops.
Virus scanners distinguish between on-access scanning (only files that are currently requested to
load are checked) and on-demand scanning (all files are checked during a scheduled scan).
Minimum requirements for the virus scanner are on-demand scanning and virus definition updating
features.
On-access virus scanners on servers are a trade-off between security and performance. We
recommend testing the performance of the system with normal virus scanner settings. If the
performance is not acceptable, it can be enhanced with various settings available in some virus
scanner programs, such as excluding certain directories or files (those that are frequently used) in
on-access scanning and on-demand scanning. For example, event logs, databases and some
custom file types which are accessed continuously should be put in the exception list, that is, those
files are not on-access scanned.
Various settings available in virus scanner programs for enhancing performance are shown below.
• Scan only local disks, network scan is disabled (when each machine has its own virus scanner).
• Disable email scans.
• In general, nothing should be excluded from scanning, but in case there are some performance
issues:
24 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
• SYS600: <drive>\sc\apl\*.* (including subdirectories) are frequently used. If this does not
solve issues then exclude the whole sc directory.
• DMS600: <drive>\DMS600\*.*
• Excluded files:
• Archive files such as .cab, .rar, and .zip
• Other settings
• Enable buffer overflow protection
• Enable access protection
• Enable script scan
• Automatic clean first, then quarantine. Deleting must be done manually by security specialist.
• Antivirus should not be allowed to clean, quarantine or delete SYS600 processes.
• Reporting:
• Maintenance personnel should check virus scanner log files on each site visit. In case of
virus detection, the issue must be escalated responsible personnel.
• There are several methods to report virus detection, such as email, printout to printer,
sending to a computer's syslog, launching a program locally (for example, a SCIL program
or VB script), or sending via SNMP Trap, to one or more computers. Sending an SNMP is
the preferred method.
• It is recommended that scan engines and virus definitions are updated automatically. However,
enabling this feature on all machines connected to the automation system network is not a
recommended practice. For a more secure and reliable deployment of virus definitions, a central
management (for example, F-Secure Policy Manager, McAfee® ePolicy Orchestrator, or
Symantec Endpoint Protection Manager) and update deployment host can be set up on a
corporate intranet. This allows a system administrator to have control over when updates are
made. Note that a direct Internet connection should only be allowed for the time everything is
downloaded; the connection is closed after downloading is finished. General guidelines are
provided in [SEC].
• If redundant servers exist, it is recommended to update scan engine and virus definitions to
these servers first. Reboot the server, open monitor, and perform some functional testing, for
example, opening process, event, alarm displays and control dialogs.
• New virus definition files should be taken into use immediately. See above recommendation for
redundant servers.
• Some scan engine updates may override current scan settings. In possible problem situations,
this should be checked.
MicroSCADA X 25
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
It is recommended to update scan engine and virus definition files regularly. Verify that the settings
introduced above are preserved and the performance and functionality of the system is acceptable
after updates.
Theoretically, a new virus definition file could arrive that could compromise the proper functionality of
the system. Testing the system against every new virus definition file is obviously not feasible.
Therefore, we recommend full system backup before updating virus definition files.
For information on installing McAfee and Symantec virus scanners, contact the partner portal if you
are a certified system integrator. If you are an end user, documentation is available based on service
agreement. The compatibility of MicroSCADA X product with the latest upgrades and virus definitions
is tested and verified monthly for some virus scanner programs. We recommend that servers are
updated according to MicroSCADA X SYS600 Patch Compatibility Report and MicroSCADA X
DMS600 Patch Compatibility Report.
In any type of a server it is a good practice to disable the devices not used. This may include USB
ports, CD/DVD drives, communication ports, and floppy disc controllers.
Run devmgmt.msc (Device Manager) and look for the devices to be disabled.
The following figure shows the disabling of DVD/CD-ROM driver, Floppy Disk Driver, Sound, Video
and Game controller, and finally the Universal Serial Bus (USB) ports.
Do not disable a device if it will be used, for example, USB license keys, alarm
sounds, or software installations.
GUID-F5708B2A-3A2E-44E8-8B7A-203342A48AC9 V1 EN-US
26 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
GUID-A5DB1A78-3973-4727-948C-4BF9AAC7EB3D V1 EN-US
GUID-871A9003-F358-4165-906D-E9FD3BC1DAB0 V1 EN-US
In most environments it is not possible to disable USB ports totally. It may be necessary to disable
USB Mass Storage devices so it is not possible to connect a USB stick or USB external hard drive to
the system. This can be done either via Group Policy in domain environments or via Local Policy in
standalone systems.
The Local Policy can be edited for example by clicking Start menu open, and starting to write group
policy until this tool is found. The tool is called gpedit.msc which you can also type.
MicroSCADA X 27
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
GUID-082B0438-B5B3-4B9C-A047-1198294AF447 V1 EN-US
Expand Computer Configuration > Administrative Templates > System, and select Removable
Storage Access.
On the right-side pane, locate "Removable Disks: Deny execute access", "Removable Disks: Deny
read access", and "Removable Disks: Deny write access". Double-click on each of them to configure
it. By setting these settings to Enabled, the access to the USB Mass Storage devices are disabled. If
the access needs to be allowed again, just set those settings back to Disabled/Not configured.
28 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
GUID-6C18EF33-50E8-4EC0-8C83-F427903D52F9 V1 EN-US
Whenever the disabling of a device is not possible, it is good practice to disable the autorun
functionality of the device. In order to prevent the automatic start of malicious code contained in a
removable device, autorun functionality must be turned off. For more information, see How to disable
the Autorun functionality in Windows, http://support.microsoft.com/kb/967715/en-us.
The computer must present a warning banner for authorized and unauthorized users at all access
points. This is needed for successfully prosecuting unauthorized users who improperly use the
computer. Warning banners in SYS600 are configurable and are located in:
• Windows OS login
• SYS600 Monitor Pro login
• SYS600 Monitor login
Workplace X and WebUI have pre-configured warning banners, and currently they can't be modified.
MicroSCADA X 29
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
• MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System
\LegalNoticeCaption
• MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\LegalNoticeText
3. Start Monitor Pro, select Tools/Engineering Tools/Display Builder and open sc\prog
\graphicsEngine\lib\views\Startup.v to modify the SYS600 Monitor Pro banner
4. Start Monitor Pro, select Tools/Engineering Tools/Tool Manager/Dialog Editor and open sc
\sa_lib\base\bbone\use\BGU_LOGIN.VSO to modify the SYS600 Monitor banner
This is configured automatically using security configuration tool, pre-configured dialogs and process
displays.
UAC is a security feature available in current Windows versions. UAC should be enabled in all
servers and workplaces. If the program requires privilege elevation, the behaviour is following:
• For administrators: Prompt for consent. A dialog is shown where either Continue or Cancel can
be selected.
• For standard users: When a standard user attempts to perform a task that requires an
administrative access a credential prompt is presented.
A shield is used in the program icon to indicate that it requires administrative privileges to run. This is
automatically detected by the operating system if, for example, Run as administrator flag is set in the
file properties or if the program has previously asked for administrative privileges. For more
information, see [UAC].
The usage of OPC communication between the OPC client and the server requires that Distributed
COM (DCOM) has been properly configured in the Windows operating system. This includes
configuring mutual user accounts between computers, system-wide DCOM settings, OPC server
specific DCOM settings, and firewall rules.
Distributed Component Object Model (DCOM) uses the Remote Procedure Call (RPC) dynamic port
allocation. By default, RPC dynamic port allocation randomly selects the port numbers. One can
control which ports RPC dynamically allocates for incoming communication and then configure the
firewall to confine incoming external communication to only those ports and port 135 (the RPC
Endpoint Mapper port) [MSDCOM04].
30 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
This has to be configured manually, see [SYSINS, Opening Monitor Pro using Remote Desktop
Services] and [DMSSYS, Connecting OPC]
From SYS600 9.4 version, OPC Data Access Server requires authentication. A
SYS600 login is required from OPC clients connected to the system via OPC Data
Access Server (OPCS). This setting can be found from sys_bascon.com
configuration file.
SNMP can be used to query configurations, measured values and status data from various devices.
It is normally used to monitor network devices, but can be used also to monitor servers.
Security Compliance Manager will add two SNMP ports in the firewall policy of SYS600 baselines.
These ports are UDP/161 and UDP/162. The ports are configured to be disabled by default, as these
are not necessary ports for normal MicroSCADA usage.
Port UDP/161 is used to query data from the server. It requires that the Windows SNMP feature is
manually installed via Settings -> Apps & Features (Windows 1o) or via Server Manager
(Win2016/2019).
Port UDP/162 is used to receive SNMP Traps from the network devices. This functionality is present
in MicroSCADA environment, but requires manual configuration.
When SNMP is used to query the status of remote devices, the following firewall configuration needs
to be applied to that Windows server where SYS600 is running.
• SNMP traffic is originating from the SYS600 machine using the UDP protocol and the
destination is port 161. Allowing outgoing UDP traffic to that remote port is thus required.
• UDP is a connectionless protocol and thus, in most firewalls, the reply packets need their own
rule.
• Remote/source port UDP/161
• Path/executable: C:\sc\prog\SNMP_OPC_Server\bin\opcs_snmp.exe
Security policies are based on security templates from Microsoft [MSWS03]. These policies are
modified for MicroSCADA X product purposes in servers and workplaces. The templates are
categorized into the following sections:
• Account policies
• Audit policy
• User rights
• Security options
• Event log
• System services
This is configured automatically using security configuration tool. See Appendix A 1.2. See also
Appendix D to see the changes to default values.
MicroSCADA X 31
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
Windows Firewall is a stateful firewall, which can be configured to allow/block inbound and outbound
connections in current Windows versions. Windows Firewall settings configured using the security
configuration tool are not configured to the public network profile. The computer might detect itself to
the public network meaning that almost all traffic will be blocked by Windows Firewall. The scope
options for the firewall settings are ALL or SUBNET. SUBNET is a general setting option allowing
only local network (subnet) traffic through the firewall. For more information, see
Windows Defender Firewall with Advanced Security.
Ports and services used by MicroSCADA X products as well as default firewall settings are listed in
Appendix B. We recommend using both hardware and software firewalls to have a well-protected
system.
This is configured automatically using the Security Compliance Manager (SCM) tool, see Appendix A
1.2.
1. After enforcing the settings, it must be verified that only those ports and
protocols which are needed in the particular environment are enabled in the
firewall settings. All other rules should be disabled, and better if removed totally.
2. In many rules created by SCM the Scope / Remote IP address is 'LOCAL
SUBNET'. If the actual remote machine is not located in the same subnet as the
particular server, the rule must be updated accordingly.
Below table lists Windows users and groups, which are preconfigured in the SYS600C device with
security configuration tool. MicroSCADA user account is created during SYS600 installation, as well
as Windows OS groups. There is an option to install preconfigured Windows groups during DMS600
installation.
To create new Windows user accounts, see Appendix A 1.4.1. Do not give administrative rights
(membership of Administrators) to operators, viewers, and engineers. Only system administrators
should have administrative rights. See also SYS600 and DMS600 Section 8.1 to see other user
accounts used in the product.
32 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
The built-in Administrator user account name is renamed during the hardening.
Administrator user account name cannot be used to login to the computer anymore,
ScAdmin must be used instead. This means that before adding new users to the
server, there are two administrative users only: MicroSCADA and ScAdmin.
• An ideal password is long and has letters, punctuation, symbols, and numbers.
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in the password, the better.
• Use the entire keyboard, not just the letters and characters used or seen most
often.
Windows AppLocker is a feature in Windows OS's that allows the user to specify which users or
groups can run particular applications in the organization based on unique identities of files. If the
AppLocker is used, rules to allow or deny applications from running can be created. Today's
organizations face a number of challenges in controlling application execution, including the
following:
MicroSCADA X 33
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 6 1MRK 511 574-UEN Rev. A
Configuring security settings for Windows OS and MicroSCADA X servers
Backing up the MicroSCADA X server with disc imaging software (for example Acronis True Image or
Norton Ghost) is highly recommended. The image should be saved on a network drive or on a USB
flash drive. Refer to the instructions from the disc imaging software manufacturer on how to
accomplish this.
The method for restoring the disc image depends on the disc imaging software. Refer to the
instructions from the disc imaging software manufacturer on how to accomplish this.
Link-Local Multicast Name Resolution (LLMNR) is a protocol which is used for resolving IP
addressess from host names when DNS server is not available in the environment. It has been
reported recently that LLMNR has big protocol level security issues, which cannot be easily fixed.
Unfortunately the functionality it provides is necessary in non-domain environments where DNS
server is not available. This basically means many environments where only one or two SYS600
installations are running in standalone configuration.
NetBIOS over TCP/IP (NBT-NS) is a protocol which predates LLMNR and offers same functionality. It
also has similar security issues, so should be disabled if environment does not require it.
1. Disable LLMNR and NetBIOS name resolving functionality. Use IP addresses instead of names
for communicating.
1.1. Unfortunately the hostnames are in most cases required when TLS-certificates are
needed.
2. Disable LLMNR and NetBIOS name resolving functionality. Add required IP addressess and
hostnames to C:\Windows\System32\drivers\etc\hosts file in all computers.
LLMNR can be disabled by editing Local Group Policy. In domain environments it should also be
disabled by editing Domain Group Policy in the same way as shown in the next figure.
34 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 6
Configuring security settings for Windows OS and MicroSCADA X servers
GUID-1D2338F1-B8B5-4747-9AD1-587C0BCB6BF3 V1 EN-US
Disabling NetBIOS over TCP/IP (NBT-NS) is not so straightforward, as it must be done individually
for all network interfaces found in the server. The following figure shows how it is done.
Disabling NBT-NS can also cause issues, especially in environments where legacy components or
software is used. So it is strongly advised to test the change thoroughly before applying it to all
production computers.
GUID-352B6FF2-175B-42B8-BF04-B5DB53D1F232 V1 EN-US
$regkey = "HKLM:SYSTEM\CurrentControlSet\services\NetBT\Parameters\Interfaces"Get-
ChildItem $regkey |foreach { Set-ItemProperty -Path "$regkey\$($_.pschildname)" -Name
NetbiosOptions -Value 2 -Verbose}
MicroSCADA X 35
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
36
1MRK 511 574-UEN Rev. A Section 7
Configuring security settings for SYS600, SYS600 Historian and DMS600 workplaces
The preferred technology between the SYS600 server and the remote workplace computer is
Workplace X or WebUI (via browser). For more information about opening monitors, see [SYSINS,
Opening SYS600 Monitor Pro].
To support applications not build with new graphics, a monitor (Monitor Pro or classic monitor) needs
to be opened. For this purpose an installation of the SYS600 software into SYS600 Workplace
computers is not required. It is enough that SYS600 Workplace computer has software installed
enabling a remote connection to the SYS600 Server. A monitor can be opened either on the server
computer or through a remote connection. If the SYS600 Workplace is a remote computer,
connection to the server computer is established over the network by using the remote client. By
default, the SYS600 service is started in the server directly after Windows has been started. This is
an automatic startup of the service, that is, no user needs to log in.
Windows automatic logon feature has been used on the server machine to
automatically open MicroSCADA monitors in remote SYS600 workplaces. However,
the use of this feature of the Windows operating system is not recommended since
Windows stores the user name and the password in cleartext in the Windows
registry, which is a security risk.
Historian server installation creates a self-signed certificate, which is used to encrypt communication
between Vtrin client and Historian server. The certificate is imported to the workstation computer
where Vtrin client is to run. For more information, see [HISADM, Managing Client Software
Distribution]
MicroSCADA X 37
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
38
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
This section lists the security features such as user account management and authorization available
in the MicroSCADA X products.
MicroSCADA X products SYS600 and DMS600 have their own user account management and they
allow user account creation, modification, and removal. They support several user accounts. The
products allow user roles with individually configurable permissions. User names are associated with
a certain user profile that restricts the user's access rights to the system. For Windows operating
system related user accounts, see Section 6.15. SYS600 Historian authentication is based on
Windows user accounts. It does not have user management of its own.
SYS600 supports local and centralized user account management scenarios. For centralized
management, a separate feature Authentication Service has to be installed that then communicates
with SDM600 server. For more information, [SYSINS, Authentication Service].
From SYS600 9.4 FP2 HF2 version onwards there is Windows single-sign-on (SSO) functionality.
For more information, see [SYSOBJ, WS attribute] and [SYSAPL, Windows single sign-on].
MicroSCADA X 39
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
40 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
In addition to user roles, DMS600 also has a region management for each user.
File system permissions restrict user access to the product installation directory and system files and
those also allow granting more permissions for non-admin user accounts. MicroSCADA X supports
running operator applications such as SYS600 Monitor Pro, DMS600 Workstation and Vtrin historian
client as non-admin user accounts. Following file system permissions are deployed by security
configuration tool:
MicroSCADA X 41
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
MicroSCADA X products support passwords with alphanumeric and special characters. Uppercase
(A-Z) and lowercase (a-z) characters as well as characters from other character sets (localization)
are also supported. Password handling is case-sensitive.
By default, password complexity is disabled. The system administrator may enable password
complexity. Other settings include a minimum password length, as well as forcing different characters
to be used in the password (a combination of alphanumeric and special characters). The maximum
password length is 63 bytes (63 ASCII characters).
SYS600 Historian user accounts are managed by Windows operating system, see secpol.msc >
Account Policies > Password Policy
42 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
• An ideal password is long and has letters, punctuation, symbols, and numbers.
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in the password, the better.
• Use the entire keyboard, not just the letters and characters used or seen most
often.
There is individual user authentication to control access to MicroSCADA X products that allows
tracing operations back to individual user accounts for the purpose of accountability. Products
support role management that can be given individually configurable permissions, which are used in
authorization. For more information, see:
MicroSCADA X SYS600, SYS600 Historian and DMS600 workstations operate in Windows operating
system and Windows offers multiple possibilities for controlling the user session after the specified
time of inactivity.
If it is required that the workstation is locked automatically after the specified time of inactivity, there
are two possible ways to configure this in Windows systems: By configuring screensaver with
password protection individually for all users, or by configuring machine inactivity timeout limit via
Local Policies (standalone computer) or Group Policies (domain joined computer).
Screen saver
The screensaver way means that when the screensaver is activated, the workstation is locked and
when the user wants to continue work, Windows prompts for password.
The following configuration change is per user, so it must be done for all users.
MicroSCADA X 43
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
GUID-C6DE3F2C-EDC0-4AD8-AFC6-08FD0987645B V1 EN-US
GUID-9919F44F-3899-44E5-9AA2-B7EB5C3F2083 V1 EN-US
4. Enable 'On resume display log-on screen' check box and click 'OK'.
44 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
GUID-4ABC8E62-1956-4129-A77B-FBDEC23F102B V1 EN-US
In addition to Screen saver settings, display power off is controlled via system power settings. Open
the Settings dialog as described above in step #1 and start to write 'power' to the search box.
MicroSCADA X 45
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
GUID-C612E493-8ACA-4C39-8D4E-957B54A4BF3A V1 EN-US
GUID-46B5F9D6-6B8B-44B1-A50D-EBD16B52EB36 V1 EN-US
46 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
It is also possible to configure the behavior for locking Windows via machine wide inactivity timeout
config. This can be configured via Local Policy for standalone workstations or Group Policy for
domain joined workstations.
The Local Policy can be edited for example by clicking Start menu open, and starting to write 'group
policy' until this tool is found.
GUID-082B0438-B5B3-4B9C-A047-1198294AF447 V1 EN-US
In the Local Policy editor select next the following path and configure the required timeout in
seconds.
Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local
Policies -> Security Options -> Interactive logon: Machine inactivity limit
MicroSCADA X 47
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
GUID-7FC91108-901C-4E45-9450-E38C1745B07B V1 EN-US
That policy actually configures the following registry path, so it can be be also edited directly. If the
DWORD field is missing, it can be added manually.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\
DWORD: InactivityTimeoutSecs
MicroSCADA
SYS600 product also has user session and inactivity time-out after certain period of time. The time
period is given in hours (from 1 to 255). It is also possible to configure session expiration
notifications. When user is logged out from SYS600 after some time period, the user is also logged
out from DMS600.
This setting affects also to Workplace X and WebUI sessions. For more information, see [SYSAPL,
User Management].
MicroSCADA X system can be configured to log events from the process, such as switching device
opened/closed and these are shown in the event list. Furthermore, the user activity events related to
security are logged. This includes events such as:
• Login success/failure
• Logout
• User created/deleted
• Role created/deleted/assigned
• Password changed/expired
48 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
In addition to these, communication modules may log security and diagnostic related UAL events.
See protocol specific manuals for details.
Furthermore, these events can be forwarded to external log servers such as Syslog or ArcSight.
Windows operating system also includes events, which can be accessed with Windows Event
Viewer.
For more information, see [SYSCON, User Account Logging] and [DMSSYS, User Activity Logging]
and [HISADM, Diagnostics].
SYS600 system configuration settings are protected through file system permissions and restrictions
on remote connection. Workplace X and WebUI are preferred ways to use application. However, due
to backward compatibility reasons SYS600 Workplaces can connect the server through Remote
Desktop Services. Remote connection should be configured so that the user of the SYS600
Workplace only has access to the SYS600 Monitor Pro application, that is, the user has no
permissions to open other applications in the server machine. For more information, see [SYSINS,
SYSCON].
File system permissions are configured automatically during the installation of SYS600. Remote
connection has to be configured manually.
SYS600 base system contains system hardening attribute SYS:BHD. This attribute can be used for
toggling certain cyber security features on and off. The exact list of attributes and their values are
described in the SYS600 Base System Objects manual. The default values are recommended when
system is set up. On production systems the REQUIRE_KNOWN_ACP_CERTIFICATE should be set
to TRUE. In certain legacy configurations it might be necessary that certain security features are
turned off. This should be done only when system can’t be set up otherwise. For more information,
see [SYSCON, Encrypted communication].
MicroSCADA X is using the PostgreSQL to store user settings related to Workplace X. In one node
systems, the connection to the PostgreSQL database is needed only from the localhost, but in HSB
configurations the remote HSB pairs need the PostgreSQL port to be open. By default, it is TCP port
5432, but in custom configurations it can be different.
SCM creates the required firewall rules for PostgreSQL connections which are set to disabled. The
Remote Address is set to 127.0.0.1 by default.
Before SCM 1.6, which is released with SYS600 10.2, the rules were set to enabled
and Remote Address was set to Local Subnet.
If you are not using SCM in your systems, you can create the rule(s) manually.
GUID-FA7C8556-80C7-4FE5-8328-21AC66FD6768 V1 EN-US
While configuring the HSB system, enable the firewall rule and allow the connections only from the
remote HSB server. This must be done on all HSB servers.
MicroSCADA X 49
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
GUID-C4850D41-9D0D-47F5-8979-54D5329BE470 V1 EN-US
Figure 15: Adding the IP address of the remote HSB pair to the firewall rule
GUID-DF1D8444-D24D-4173-BD32-26B238B6BF72 V1 EN-US
Now the rule is Enabled, and the connection is allowed only from the remote HSB server IP, as
shown in the Figure 17.
GUID-A129E172-2DFA-4DDB-9BDA-9AE0DF1BCE0B V1 EN-US
Figure 17: PostgreSQL firewall rule is enabled with the correct remote IP address
50 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
SYS600 Notify is a service to see the status of the SYS600 server. In addition to normal notify
messages from MicroSCADA applications, it shows system messages and errors during start-up,
runtime, and shutdown.
SYS600 Notify is a read-only monitoring service available by default on TCP port 21850. In one node
systems, this port should not be opened in the firewall, as it is normally needed only on localhost.
If system architecture requires that this service be accessed remotely as well, firewall configuration
must allow connections only from the required and specified remote addresses. Port information is
also found in Appendix B.
SYS600 data source connection to Historian server database is established using WebSocket
Secure communication (SYS600 Historian 1.2 or later). The connection string to be used is wss://
<host>/history in the SYS600 database logging profile configuration. For more information about data
source configuration, see [SYSCON, Historian] and [SYSAPL, SYS600 Historian]
DMS600 system configuration settings are mainly stored to the relational database. Authentication is
required to read and write to the database. It is recommended to use Windows authentication and
preconfigured Windows groups such as ScViewers and ScOperators to access the database. For
more information, see [DMSINS, Database Server Installation].
Use of TLS Version 1.0 is flagged as an old version (from July 2018) by several
security auditing tools based on PCI DSS (payment card industry security standard).
Because DMS600 is using WCF communication TLS 1.0 setting is enabled in
DMS600 security baseline included in the security configuration tool (SCM). To be
changed in future versions.
TLS 1.0 is controlled by MACHINE\SYSTEM\CurrentControlSet\Control
\SecurityProviders\Schannel\Protocols\TLS 1.0\Server\Enabled registry setting.
DMS600 Workstation and Network Editor can be opened with non-admin rights (Windows standard
user). There are some file system permissions, which are needed and these are configured
automatically using security configuration tool.
Private keys, which are used in encrypted communication, should not be left
unprotected in the file system and must be protected with access control lists (ACL).
Verify that only users needing read/write access have permissions to access private
keys. This is normally Administrators group in Windows.
SYS600 10.x installation protects many of certificates listed below automatically.
However, in customer deployments it is required to manually configure access
control list of certificates needed, for example, in DNP 3.0 and IEC60870-5-104
secure communication.
MicroSCADA X 51
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
Secure communication such as HTTPS uses private keys and public certificates to encrypt
communication channels. By default, self-signed certificates are generated when the product is
initialized. It is recommended to replace self-signed certificates with certificates generated by, for
example, internal certificate authority (CA). Following table lists certificates used in SYS600.
IEC60870-5-104 secure Location of private key ASCII PEM format, Yes • Self-signed
communication between and public certificates human readable. certificate is
master and slaves. IEC can be chosen freely, for Passphrase protection created according
60870-5-104 secure example, by creating a can be configured. to IEC
authentication (IEC/TS new directory such as sc 60870-5-104
62351-5) with TLS \prog\pc_net\ certs\. protocol settings if
(IEC62351-3). configured.
• Documentation:
SYS600 IEC
TLS should only be used 60870-5-104 Slave
when secure Protocol Manual >
authentication is Instructions >
configured. By default, Configuration >
there is no secure Communication
authentication. system
configuration >
Security attributes;
SYS600 System
Configuration
Manual >
Configuration >
Configuring
process
communication >
Configuring
process
communication
units > Secure
communication
using TLS (IEC
62351-3)
52 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 8
Configuring security features in SYS600, SYS600 Historian and DMS600 products
MicroSCADA X 53
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Section 8 1MRK 511 574-UEN Rev. A
Configuring security features in SYS600, SYS600 Historian and DMS600 products
This feature is used if the SYS600 system administrator's user name or password is lost. In this
case, it is possible to login to the system using a temporary password. For more information, see
[SYSOBJ, EY attribute].
This feature is used if the DMS600 administrator's user name or password is lost. To reset password:
To reset SYS600 administrator password, Windows user has to have administrative privileges to the
Windows operating system. If the attacker has these privileges, then the system has already been
compromised and it is, for example, possible to install keylogger to find users and passwords of the
industrial control system.
54 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Section 9
Standard compliance statement
Cyber security issues have been the subject of standardization initiatives by ISA, IEEE, or IEC for
some time. Hitachi Energy plays an active role in all these organizations, helping to define and
implement cyber security standards for power and industrial control systems. Hitachi Energy
participates in the development by delegating subject matter experts to the committee working on the
respective standard.
Hitachi Energy strongly recommends to use also existing common security measures available in the
market, for example, VPN for secure Ethernet communication.
Hitachi Energy has identified cyber security as a key requirement and has developed a large number
of product features to support the international cyber security standards such as NERC CIP, IEEE
1686 and IEC 62351/62443.
MicroSCADA X 55
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
56
1MRK 511 574-UEN Rev. A Appendix A
Quick Configuration Guideline
In this section, the configuration of computers (both servers and workplaces) used in MicroSCADA X
systems is described in simple steps.
In order to reduce the risk of having malware planted into the system in the engineering phase,
deploying security settings right after installing MicroSCADA X software is recommended and that
basic security steps are taken to secure all computers in the system. MicroSCADA X product
includes a security configuration tool for configuring several security categories in the computer:
• Windows users and groups: Users and respective groups are created according to IEC 62351
roles. Non-admin user accounts are automatically created. Note that configurations of other
security categories, namely Application Allowlisting, Local security policy, and File system
permissions, are based on these groups.
• Firewall: Enables firewall and preconfigures product specific ports. Communication protocols
are by default blocked.
• Local security policy: Secures the computer with Password policy, Account policy etc.
• Services: Unnecessary services are disabled
• Windows standard user/File system permissions: Restricts user access to MicroSCADA X
installation folder and assigns permissions for non-admin user accounts automatically.
• Audit policies: Configures what events are logged into Windows event logs.
• Application allowlisting: Windows AppLocker is used to restrict access to programs.
MicroSCADA X 57
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix A 1MRK 511 574-UEN Rev. A
Quick Configuration Guideline
Tool configuring other security areas, such as Local security policy and Application
allowlisting, are based on these users and groups.
It is recommended to deploy security settings locally to avoid remote access denied
problems.
Before configuring security settings, the server should be updated with the latest
service packs and security updates.
User Account Control (UAC)
A user with administrative privileges starts programs by default with non-admin
privileges. If administrative privileges are needed, for example, to write some file to
the file system where Windows standard users do not have permissions to write, this
write will fail. Start programs with "Run as administrator" if you need administrative
privileges. A consent dialog is shown that program is to be run with administrative
privileges.
For more information, see Appendix A 1.5.
• An ideal password is long and has letters, punctuation, symbols, and numbers.
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in the password, the better.
• Use the entire keyboard, not just the letters and characters used or seen most
often.
Security Compliance Manager (SCM) was previously delivered with SYS600 and DMS600
installation packages, but is now delivered separately. It can be downloaded from the MicroSCADA
Partner Portal.
58 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix A
Quick Configuration Guideline
2.1. The destination folder can be changed, but it is highly recommended to use the default
path. Changing the installation path is not supported.
BIOS SETTINGS
- Password(s) is enabled
MICROSOFT UPDATES
Before configuring security settings, the computer needs to be updated with the latest security
updates and service packs from Windows that are tested and certified. The test results can be found
from the partner portal if you are a certified system integrator or if you are an end user, these reports
can be made available to you based on your service agreement.
RUNNING HARDENING
If there are several Hitachi Energy products installed, for example, SYS600 and
DMS600 in the server, follow instructions in the Help page of the tool.
3. Press Audit. It will take a while to finish. Log page gives details of the audit process and there is
also a log file that can be accessed.
4. After auditing is finished, select all security categories in the tree and press Enforce to continue.
It will take a while to finish. Log page gives details of the audit process and there is also a log file
that can be accessed.
5. Reboot the computer
You can visit the Help page in the security configuration tool at any time.
RUNNING HARDENING
MicroSCADA X 59
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix A 1MRK 511 574-UEN Rev. A
Quick Configuration Guideline
1. Copy \Program Files (x86)\ABB\MicroSCADA Pro\ABB.SCM\ folder on the USB stick. From the
USB stick, run ABB.SCM.exe security configuration tool.
2. Check that selected baselines are according to the computer, for example, Windows 10/
Microscada/SYS600 10 workstation.
3. Press Audit. It will take a while to finish. Log page gives details of the audit process.
4. After auditing is finished, select all security categories in the tree and press Enforce to continue.
5. Reboot the computer
You can visit the Help page in the security configuration tool at any time.
Preconfigured Windows user accounts and groups are created in the hardening script.
This can be achieved with lusrmgr.msc tool or with following commands to the command prompt:
The default firewall settings in SYS600 product block all communication protocols, such as DNP,
ELCOM-90, and IEC60870-5-104. Therefore, ports for the used communication protocols must be
manually opened. To customize firewall settings in a single computer:
1. Windows 10/Server 2012R2/2016/2019: Run wf.msc and browse to Inbound Rules. Find the
communication protocols from the list, for example, “SYS600: DNP 3.0 Slave”, and enable/
disable the rule according to customer specifications. A green balloon means that the traffic is
allowed. A grey balloon means that the traffic is blocked. Confirm the changes when done.
2. DMS600 specific firewall ports are indicated with 'DMS600' prefix
60 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix A
Quick Configuration Guideline
If a new program needs to be allowed to several computers or to each delivered computer, the best
way is to create a custom baseline, which is then enforced to all computers. For more information,
see Help page on the security configuration tool.
“SYS600:“ and “DMS600:” prefix is used in the rule names to help finding settings.
If a new program needs to be allowed to several computers or to each delivered computer, the best
way is to create a custom baseline, which is then enforced to all computers. For more information,
see Help page on the security configuration tool.
Operators, viewers, and engineers can use non-admin Windows user accounts. However, these user
accounts require a few permissions. File system permissions for non-admin users are configured
automatically in the security configuration tool. To prepare computer for non-admin users:
The table below shows the services, which have to be changed from the default if a functionality is
required. For example, to take audio in use the following commands can be used for each service
listed below:
MicroSCADA X 61
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix A 1MRK 511 574-UEN Rev. A
Quick Configuration Guideline
Windows 7 and later versions support network location awareness. The operating
system detects the following network location types automatically: Public, Private,
and Domain. If the computer automatically changes the network location to Public,
where the firewall rules are the most restrictive, some SYS600 functionalities are
blocked. The network location of SYS600 server and workplace should be Private or
Domain. To manually change the location, see Appendix Configuring network
location.
When troubleshooting network problems, it is recommended to check the firewall logs (Windows
Firewall: %windir%\pfirewall.log). It is also possible to disable firewall temporarily to solve network
problems. Windows event logs, especially Security, Application, and System logs may have events
related to security/access problems. Windows AppLocker has a log, where blocked applications can
be found. The log can be accessed from Event Viewer/Applications and Services Logs/
Microsoft/Windows/AppLocker. AppLocker can also be set to Audit Only mode, which means that
applications are allowed to run and the log contains events of when the application would have been
blocked if the rules were enforced.
If a user manually changes the network profile of an unidentified network from the Network and
Sharing Center, the new setting will only apply until a change, such as a new gateway, disconnect/
reconnect, reboot, new IP settings, etc., on that connection occurs. If the network is not a Domain
network and there is no default gateway configured, or the gateway is not available, the network will
be categorized as unidentified and the Public profile and Public firewall policy will be applied to the
computer.
Normally, in MicroSCADA X system, a static IP addressing is used. If the network adapter has a
static IP address and a subnet mask but not a default gateway, the operating system does not
recognize the Private network. To change the default gateway from Network and Sharing Center:
62 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix B
Ports and Services
Since all inbound traffic is blocked by default, there are exceptions (firewall rules) which need to be
configured. Windows Firewall rules are configured automatically using security configuration tool, see
Appendix A 1.2.
Inbound listening
Service: Service Port Port number Port status Configured Miscellaneous Used by
Description number configurable by SCM
msrpc / dcom- Remote TCP 135 Always Open Inbound range for [System,
scm procedure call / Open DCOM servers svchost.exe]
DCOM Service are automatically
Control Manager restricted by
scripts, see also
[MSDCOM04]
netbios-ssn Netbios Session TCP 139 Always Open [System]
Service Open
microsoft-ds Microsoft Active TCP 445 Always Open [System]
Directory, shares Open
microsoft-ds Microsoft Active UDP 445 [System]
Directory, shares
ntp SNTP - Simple UDP 123 Always Open [System]
network time Open
protocol
Netbios-ns Netbios Name UDP 137 Always Open [IEC 61850 OPC
Service Open Server]
Netbios-dgm Netbios UDP 138 Always Open [System]
Datagram Service Open
Table continues on next page
MicroSCADA X 63
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix B 1MRK 511 574-UEN Rev. A
Ports and Services
Inbound listening
Service: Service Port Port number Port status Configured Miscellaneous Used by
Description number configurable by SCM
Isakmp IPSec in UDP 500 Always Open [System]
Windows Open
lsass.exe sae-urn, IPsec UDP 4500 Always Open [System]
NAT-Traversal Open
wininit.exe, * TCP X Always [System]
svchost.exe 49152-491 Open *) Dynamic port
etc. 58 range can be
configured
Table 9: SYS600
64 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix B
Ports and Services
All master protocols using TCP/IP (IEC60870-5-104 master, DNP3.0 TCP master,
Modbus TCP, SPA-TCP) operate as TCP clients. Consequently, no protocol specific
port numbers are reserved.
MicroSCADA X 65
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix B 1MRK 511 574-UEN Rev. A
Ports and Services
• Know your network perimeter, zones and conduits. Use firewalls to limit access
to machines. Do not mix Office/Corporate LAN with Industrial Control System
LAN.
• All unneeded applications and services (TCP/UDP ports) should be removed/
stopped. Use firewalls to limit access to ports.
• Encrypt communication by using IPSec/VPN tunnels between machines if there
is no built-in security mechanism.
• Use latest product versions to get new security enhancements.
Inbound (listening)
Service: Port Port number Port status Configured by Description Security
number configurable SCM
IEC60870-5-10 TCP X Configurable Closed IEC 60870-5-104 for Secure: No
4 Slave 2404 telecontrol equipment and Threat:
systems with coded bit Through the
serial data transmission in communication
TCP/IP based networks protocol it is
for monitoring and possible to
controlling geographically control electric
widespread processes. network.
Network Control Center
(NCC).
IEC60870-5-10 TCP X Configurable Secure communication for IEC60870-5-10
4 Secure 19998 IEC60870-5-104 4 secure
Authentication communication
Slave is
authenticated
and encrypted.
IEC60870-5-10 TCP X Configurable Accepts localhost N/A
4 Slave - 2501-25 connections only, open
Communication 14 only a short period of time
lines in system startup.
IEC60870-5-10 TCP X Configurable Accepts localhost N/A
4 Master - 2501-25 connections only, open
communication 14 only a short period of time
lines in system startup.
DNP 3.0 TCP X Configurable Closed Secure communication for DNP 3.0
Secure 19999 DNP 3.0 secure
Authentication communication
Version 5 is
LAN/WAN authenticated
Slave and encrypted.
DNP 3.0 UDP X Configurable Closed The Distribute Networks Secure: No.
LAN/WAN and Protocol (DNP) 3.0 Use DNP 3.0
Slave TCP LAN/WAN is a standards- Secure instead.
20000 based communication Threat:
protocol designed for Through the
electric utility, water, oil & communication
gas and security systems. protocol it is
possible to
control electric
network.
Table continues on next page
66 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix B
Ports and Services
Inbound (listening)
Service: Port Port number Port status Configured by Description Security
number configurable SCM
DNP 3.0 TCP X Configurable Accepts localhost N/A
LAN/WAN 2501-25 connections only, open
Slave - 14 only a short period of time
Communication in system startup.
lines
DNP 3.0 UDP X Configurable Accepts localhost N/A
LAN/WAN and connections only, open
Master - TCP only a short period of time
Communication 2501-25 in system startup.
lines 14
Modbus TCP X Configurable Closed Modbus Protocol is a Secure: No
TCP/IP Slave 502 messaging structure used Threat:
to establish master-slave/ Through the
client-server communication
communication between protocol it is
intelligent devices. It is possible to
used in gas and oil and control electric
substation applications network.
but also in building,
infrastructure,
transportation and energy
applications. There is no
built-in security in Modbus
protocol.
Modbus TCP X Configurable Accepts localhost N/A
TCP/IP Master 2501-25 connections only, open
- 14 only a short period of time
Communication in system startup.
lines
SPA-TCP - TCP X Configurable Accepts localhost N/A
Communication 2501-25 connections only, open
lines 14 only a short period of time
in system startup.
ELCOM-90 TCP X Configurable Closed ELCOM-90 is used to Secure:No
Provider 6997 transfer information Threat:
between control centers Through
and it is inter-control ELCOM-90 it is
center communication possible to
protocol (ICCP). control remote
systems.
ELCOM-90 TCP X Configurable Closed Inter-process Secure:No
UserElem 6998 communication Threat:
Through
ELCOM-90 it is
possible to
control remote
systems.
ELCOM-90 TCP X Configurable Closed Used to debug Provider Secure:No
Admin 6999
Opcs_iec61850 Dynamic X Configurable IEC 61850 OPC DA Secure:No
.exe TCP, Server. By default accepts Threat:
see local COM/DCOM Through the
[MSDC connections only. communication
OM04]. protocol it is
possible to
control electric
network.
Table continues on next page
MicroSCADA X 67
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix B 1MRK 511 574-UEN Rev. A
Ports and Services
Inbound (listening)
Service: Port Port number Port status Configured by Description Security
number configurable SCM
Opcs_iec61850 TCP X Configurable IEC 61850 OPC DA Secure:No
.exe 123 Server, which contains
SNTP Server as TCP/IP
Server (IEDs
synchronizes time with
this) and also SNTP
Client. See ntp service.
61850_server.e TCP Configurable Open IEC 61850 Server (10.1 Secure:No
xe 102 and later). IEC 61850 Threat:
(MMS) server is a TCP/IP Through the
server. communication
protocol it is
possible to
control electric
network.
61850_server.e TCP Configurable Open IEC 61850 Server (10.1 Secure: Yes
xe 3782 and later). IEC 61850
(MMS) server is a TCP/IP
server.
Used for secure MMS.
Inbound (listening)
Service: Port Port number Port status Configured by SCM Description Security
number configurable
Microsoft TCP Configurable Open Microsoft Windows Remote
Windows 3389 Terminal Services desktop
Remote [Terminal Server Client, sessions
Desktop RDP Client] operate over
Services an encrypted
channel.
Citrix ICA TCP Configurable MetaFrame Application Remote
1494 Server for Windows / desktop
Citrix ICA sessions
operate over
an encrypted
channel.
68 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix B
Ports and Services
Table 14: DMS600 4.5 (in addition to those listed in DMS600 4.4)
Inbound (listening)
Service: Port Port number Port status Configured by Description Security
number configurable SCM
PostgreSQL TCP X Only localhost PostgreSQL instances
5433 used by WebMap.
DMSService.ex TCP X Always Open Closed Modules in this service Secure: No.
e 9000 provides data. Communication
MBTileServer for is encrypted
background maps, (HTTPS) but it
NetworkTileServer for is not
network model and authenticated.
NGDMSFileServer for file Threat: It might
transfer. be possible to
access electric
network maps
and network
state data.
MicroSCADA X 69
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix B 1MRK 511 574-UEN Rev. A
Ports and Services
Inbound (listening)
Service: Port Port number Port status Configured by SCM Description Security
number configurable
Ms-sql-s TCP Always Open Open Microsoft SQL Server Secure:Yes,
and see link
UDP
1433
Ms-sql-m TCP Always Open Open Microsoft SQL Monitor Secure:Yes,
and see link
UDP
1434
DMSSocketSer TCP X Always Open Open DMS WebSocket Secure: Yes
vice.exe 51772 Is optionally Service,
DMSWebSock defined using communication
etService.exe OS System between applications
(New in 4.6 variable [DMS600 SA, WS, NE]
version. DMSComPort and DMS and SA
Secured Service.
communication
with certificate)
UnknownSocke TCP Configurable Open Socket service to be Secure: No
tService.exe 51773 used by 3rd party Threat:
Removed in programs for sending Through the
DMS600 4.6 messages communication
protocol it
might be
possible to
access manual
process points
and tamper
outage/
interruption
data.
DMS Service TCP Always Open Open DMS600 Service Secure: Yes
Framework 51777 Monitor
DMS SA TCP Always Open Open DMS600 Service Secure: No
Service, 51785 Monitor uses this Threat: It might
DMS600SA.ex service to monitor the be possible to
e status. control DMS
SA Service.
CaCe Fault TCP Configurable Open Tieto Care Center Secure: No
Receiver 8086 (CaCe) WMS. Work Threat: It might
management system be possible to
and LV reporting and access work
fault information. management
Optional software, system and
depending customer fault
license/needs. information.
CaCe Fault TCP Configurable Open Tieto Care Center Secure: No
Sender 8087 (CaCe) WMS. Work Threat: It might
management system be possible to
and LV reporting and access to work
fault information. management
Optional software, system and
depending customer fault
license/needs. information.
Table continues on next page
70 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix B
Ports and Services
Inbound (listening)
Service: Port Port number Port status Configured by SCM Description Security
number configurable
PowerGrid NIS TCP Configurable Open Tieto PowerGrid NIS Secure: No
Server, PG 3000 (Network Information Threat: It might
Server TECS- System). Network be possible to
service information, customer access electric
and energy data. network,
Optional software, customer and
depending customer energy data.
license/needs.
AMR (http) TCP 80 - Configurable Open Automatic Meter Secure: No
Reading (AMR), energy Threat: It might
data. Microsoft Internet be possible to
Information Server (IIS) access energy
runs AMR Service. data.
Optional software,
depending customer
license/needs.
AMR (https) TCP - Configurable Open Secure: Yes
443
Inbound (listening)
Service Port number Port status Configured by SCM Description
ICMP Open Open ICMP Ping
SFTP TCP 22 Configurable Close Port used only if
SFTP file transfer
option is used for
Disturbance Records
retrieval.
LDAP TCP 389 Open Open SDM600 Centralized
Account
Management (LDAP
Authentication)
HTTPS TCP 443 Open Open HTTPS web access
SYSLOG UDP 514 Open Open Centralized Activity
Logging Service
(Syslog over UDP)
LDAPS TCP 636 Open Open Centralized Account
Management secure
connection (LDAP
Authentication)
FTPS TCP 989-990 Configurable Close Port used only if
FTPS file transfer
option is used for
Disturbance Records
retrieval.
SQL Server TCP 1433 Open Open SQL Server
Syslog TCP 1468 Open Open Centralized Activity
Logging Service
(Syslog over TCP)
RADIUS (TCP) TCP 1812 Open Open Centralized Account
Management
Service (RADIUS
communication)
Table continues on next page
MicroSCADA X 71
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix B 1MRK 511 574-UEN Rev. A
Ports and Services
Inbound (listening)
Service Port number Port status Configured by SCM Description
RADIUS (UDP) UDP 1812 Open Open Centralized Account
Management
Service (RADIUS
communication)
SQL Server TCP 58900 Open Open SQL Server
HRC Init TCP 59100-59199 Open Open SDM600 internal
service (Parent-Child
Initialization)
CAL Event TCP 59200 Open Open SDM600 internal
Aggregator service (Centralized
Activity Logging
Service)
SDM Clustering TCP 59960 Configurable Close Parent/child, needed
only on the child
system
HSB Init/HRC Run TCP 59990-59999 Open Open SDM600 internal
service (Parent -
Child, HotStandby
Initialization)
HSB Run TCP 60000-600010 Open Open SDM600 internal
service (Hot -
Standby)
HRC Migration TCP 61743 Configurable Close SDM600 internal
service - open only
during migration
from previous
versions of SDM600
72 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix C
Windows System Services
Windows system services are described in detail in Threats and Countermeasures Guides.
The settings below are a collection of services which are automatically disabled by security
configuration tool.
Not all services are running in each operating system, and may not even exist. The
detailed list of recommended service settings can be found from security
configuration tool. The security configuration is deployed so that it ignores the
unavailable services. Therefore, it is normal to have these kinds of messages in the
log file:
• Error 1060: The specified service does not exist as an installed service. Error
opening <service name>.
• Error 1060: The specified service does not exist as an installed service.
Opening service <service name> for stop access failed.
• Legacy audit settings are disabled. Skipped configuration of legacy audit
settings.
Some functionalities need certain services to be enabled. To enable some feature, see Appendix A
1.4.4.
MicroSCADA X 73
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix C 1MRK 511 574-UEN Rev. A
Windows System Services
74 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix D
Security Policies
The table below shows an overview what settings are changed in the MicroSCADA X servers and
workplaces compared to the hardened operating system settings (Microsoft Security Compliance
Manager baselines). Full listing of changed settings can be seen from the security configuration tool.
MicroSCADA X 75
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix D 1MRK 511 574-UEN Rev. A
Security Policies
76 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix D
Security Policies
MicroSCADA X 77
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
78
1MRK 511 574-UEN Rev. A Appendix E
Application Allowlisting - AppLocker
AppLocker is a Windows internal technology to control who can open/run specified applications. The
AppLocker approach and rules were updated for SYS600 10.4 and DMS600 4.6. The updated rules
are included in System Compliance Manager (SCM) release 2.0.
With AppLocker, you can say that these users/groups can run applications from this path or signed
by this signature. Both approaches are used in MicroSCADA related rules.
There are no restrictions set for accounts in the Administrators group, as those accounts can anyway
change rules manually. Thus, it would cause only a short delay for the attacker, not real protection.
Windows security relies on the principle that an attacker does not have admin rights to the computer.
The rules for SYS600 are shown in the figures below, and they can be found in the SCM installation
directory. In most cases, SYS600 related rules are found in C:\Program Files (x86)\ABB
\MicroSCADA Pro\SCM\baselines\product\SYS600\10 server\applocker.xml. The rules for other
programs may differ slightly, but the basic principle is the same.
If a non-admin user tries to start a program which does not match the rules, the following notification
window appears.
GUID-E8483A73-9406-4AE2-AEA8-628C4C83E311 V1 EN-US
The rules set by the SCM tool allow everyone to run programs from the Windows-folder and from
Program Files/Program Files (x86) -folders, with the exception of some specific temp/log folders.
Also, programs signed by ABB/Hitachi Energy signatures are allowed to be run by everyone. The
target of the function is that the attacker with only operator level access to the machine can not
download attack tools/scripts from the Internet and run those.
MicroSCADA X 79
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix E 1MRK 511 574-UEN Rev. A
Application Allowlisting - AppLocker
GUID-8697EEE4-5901-445D-A5D1-8032A8050D7D V1 EN-US
GUID-DEBFAB8A-1EF5-485A-BA77-C47A4FEC0735 V1 EN-US
80 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix E
Application Allowlisting - AppLocker
GUID-B7096FF3-F454-43C6-B6D0-436C062F229B V1 EN-US
GUID-EA1E0780-4271-427F-B872-C53772A6CCF1 V1 EN-US
GUID-DD35D3D0-8CE9-41C5-80D6-AB1B61DA97AF V1 EN-US
MicroSCADA X 81
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix E 1MRK 511 574-UEN Rev. A
Application Allowlisting - AppLocker
GUID-60B56B13-3C77-49E6-BA71-307F193DD944 V1 EN-US
If there is a need to customize the rules for a specific environment, it can be done easily. The
changes require admin-level access to the computer. One normal use case is that there are 3rd party
tools which require either a path or a signature to be added to the policy.
AppLocker rules are 'Deny by default' type, so everything not covered by the rules is denied.
AppLocker rules can be configured either manually (via Domain/Local Group Policy) or via
PowerShell. Instructions for the PowerShell can be found at:
https://docs.microsoft.com/en-us/powershell/module/applocker/
The xml required for PowerShell can be found from C:\Program Files (x86)\ABB\MicroSCADA Pro
\SCM\baselines\product\SYS600\10 server\applocker.xml. This can be edited and then imported
with PowerShell.
1. Go to the Start menu, and in the search field, type group and select the Edit group policy tool.
See Figure 25 for more details.
GUID-6D13262E-6B47-4C2A-A51C-3791C649902C V1 EN-US
82 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix E
Application Allowlisting - AppLocker
GUID-A2E139CE-0F92-4DC0-8A6A-35D18A31D66F V1 EN-US
GUID-B778192C-0B9D-42DD-8B8F-BA3305A2E1E8 V1 EN-US
For every rule, it is necessary to configure the user or group that the particular rule affects.
MicroSCADA X 83
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix E 1MRK 511 574-UEN Rev. A
Application Allowlisting - AppLocker
GUID-CDBE3222-FEFF-4EEE-8B1E-FB209B6C336C V1 EN-US
Rules can be created either by utilizing the properties of the code signing certificate (Publisher
information), the path where the file is located, or a file hash. In MicroSCADA default rules, the first
two of those are utilized.
GUID-E18DF99A-1759-4A26-B583-924D9ABDC910 V1 EN-US
With the publisher rule, you need to have a proper certificate used to sign the code. It is not possible
to use a self-signed certificate.
When configuring a publisher rule, a properly signed binary is required to give the baseline for the
rule.
84 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix E
Application Allowlisting - AppLocker
After the correct binary has been selected, various fields can be set to '*', which means that the
particular field accepts every string. The settings can be changed by moving the slider or selecting
'Use custom values'.
GUID-67B572E9-A872-44C8-A1E2-8E33BB84BDAC V1 EN-US
For every rule, it is possible to configure exceptions in the same way as the actual rules are
configured.
GUID-1A10BD0C-198F-41E4-859F-ED66DE939859 V1 EN-US
Rules covering executable paths can either use the whole directory or the exact path to the specific
file. For the path type of rules, an exception can also be configured.
MicroSCADA X 85
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix E 1MRK 511 574-UEN Rev. A
Application Allowlisting - AppLocker
GUID-118ED305-7E21-4F2D-8CC7-569D7A302B04 V1 EN-US
86 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
The configuration for Windows Server 2019 is shown below. Same method applies to other Windows
Server versions.
An IPSec policy secures all IP traffic that is specified in the configured IPSec filters. The decision to
allow unsecured IP traffic is up to the user. To configure SYS600 for IPSec transport mode:
1. Open the Start menu, click Run, and type in secpol.msc to start the IP Security Policy
Management snap-in.
GUID-F33E6FC0-F43A-44D5-84F4-BAE6477423D1 V1 EN-US
2. Right-click IP Security Policies on Local Computer, and then click Create IP Security Policy.
3. Click Next, and type in a name for the policy (for example, IPSec Tunnel with Network Control
Center).
MicroSCADA X 87
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix F 1MRK 511 574-UEN Rev. A
Virtual Private Network
4. Click to clear the Activate the default response rule check box, and then click Next.
GUID-D0342254-9914-4B3E-8EBA-78542D77DAAF V1 EN-US
88 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
1. In the new policy properties, click to clear the Use Add Wizard check box, and then click Add to
create a new rule.
MicroSCADA X 89
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix F 1MRK 511 574-UEN Rev. A
Virtual Private Network
GUID-997CAC70-5FC4-4D8D-96CC-68FC8C32A6AD V1 EN-US
90 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
3. Type in an appropriate name for the filter list (for example, IP traffic to NCC), click to clear the
Use Add Wizard check box, and then click Add.
MicroSCADA X 91
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix F 1MRK 511 574-UEN Rev. A
Virtual Private Network
4. In the Source address, click A specific IP Address, and type the IP Address of SYS600
towards NCC (the IP address that communicates with the NCC), as this filter should only apply
to the network interface connected to the WAN.
5. In the Destination address box, click A specific IP Address, and then type the IP Address of
the NCC (the NCC’s IP address that SYS600 connects to).
6. Leave the Mirrored selected.
7. Click the Protocol tab. Make sure that the protocol type is set to Any because IPSec does not
support protocol-specific or port-specific filters.
92 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
8. If a description for the filter is desired, click the Descriptions tab. Click OK.
9. Click OK to close IP Filter List dialog.
1. Click the IP Filter List tab, and then click to select the created filter list.
MicroSCADA X 93
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix F 1MRK 511 574-UEN Rev. A
Virtual Private Network
2. Click the Tunnel Setting tab, click This rule does not specify an IPSec tunnel.
3. Click the Connection Type tab, click Local area network (LAN)
4. Click the Filter Action tab, unselect the option Use Add Wizard, click Add. In New Filter Action
Properties window choose Security Methods tab, and select one of the options
• Permit - Permits unsecured IP packets to pass through.
• Block - Blocks unsecured IP packets to pass through.
• Negotiate Security – Traffic is handled based on configuration done from Add-button,
recommendation is to use Integrity and encryption. For debugging purposes Integrity only
can be used.
5. Click the General tab, and give name for the filter
94 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
None of the check boxes at the bottom of the Filter Action dialog box are selected as
an initial configuration for a filter action that applies to tunnel rules.
GUID-394272E8-58F6-428A-AC2D-1659670DDA43 V1 EN-US
As the currently configured IP Filter rule matches only a single IP, it does not discard
non-IPSec traffic originating from a different wide area network IP address. In order
to prohibit any non-IPSec connections from the wide area network, the IP filter list
has to match the subnet of the wide area network, and the Filter Action has to be set
to “Negotiate Security”.
6. Click the Authentication Methods tab to configure the authentication method.
7. Click Add.
8. Select Use a certificate from this certification authority (CA) if there is a possibility to use such
certificate (preferred), or Use this string (preshared key) and enter a long key that also contains
special characters. This string must be the same on the machine that matches the IP filter rule
(in this case, the NCC). Click OK.
MicroSCADA X 95
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix F 1MRK 511 574-UEN Rev. A
Virtual Private Network
9. Mark the default Kerberos method and click Remove the inquiry. Click Close to close New
Rule Properties dialog.
10. Click OK.
11. In the Local Security Settings, right-click on the created rule (for example, IPSec Tunnel with
Network Control Center) and select Assign The rule indicates by a green dot that it is active.
Close the Local Security Settings.
Repeat the steps for all machines that should use IPSec. It is possible to export and import the
policies on a different computer. Here are the instructions:
96 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix F
Virtual Private Network
1. In the Local Security Settings, where the VPN configuration is set, select IP Security Policies
on Local Computer.
2. Select Action/All Tasks/Export Policies... and write a file name.
3. In the other computer, where VPN configuration is needed: open Local Security Settings and
select IP Security Policies on Local Computer.
4. Select Action/All Tasks/Import Policies....
5. Select a file exported in item 2 and press Import/OK.
6. The rules should be checked and adapted, for example, swap Source address and Destination
address in IP Filter Properties dialog.
For IPSec interoperability between different devices and vendors, see configuration profile in
[LEMNOS11].
MicroSCADA X 97
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
98
1MRK 511 574-UEN Rev. A Appendix G
Introduction to SCADA Security
The following excerpt is taken from Supervisory Control and Data Acquisition (SCADA) Systems,
CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY, cisa.gov.
In today’s corporate environment, internal networks are used for all corporate communications,
including SCADA. SCADA systems are therefore vulnerable to many of the same threats as any
TCP/IP-based system.
Security in an industrial network can be compromised in many places along the system and is most
easily compromised at the SCADA host or control room level. SCADA computers logging data out to
some back-office database repositories must be on the same physical network as the back-end
database systems, or have a path to access these database systems. This means that there is a
path back to the SCADA systems and eventually the end devices through their corporate network.
Once the corporate network is compromised, then any IP-based device or computer system can be
accessed. These connections are open 24x7 to allow full-time logging, which provides an opportunity
to attack the SCADA host system with any of the following attacks:
• Use a Denial of Service (DoS) attack to crash the SCADA server, leading to a shutdown
condition (System Downtime and Loss of Operations)
• Delete system files on the SCADA server (System Downtime and Loss of Operations)
• Plant a Trojan and take complete control of system (Gain complete control of system and be
able to issue any commands available to Operators)
• Log keystrokes from Operators and obtain usernames and passwords (Preparation for future
take down)
• Log any company-sensitive operational data for personal or competition usage (Loss of
Corporate Competitive Advantage)
• Change data points or deceive Operators into thinking control process is out of control and must
be shut down (Downtime and Loss of Corporate Data)
• Modify any logged data in remote database system (Loss of Corporate Data)
• Use SCADA Server as a launching point to defame and compromise other system components
within corporate network.
For a company to protect its infrastructure, it should undertake the development of a security strategy
that includes specific steps to protect any SCADA system. Such a strategy may include the following
approach.
Developing an appropriate SCADA security strategy involves analysis of multiple layers of both the
corporate network and SCADA architectures including firewalls, proxy servers, operating systems,
application system layers, communications, and policy and procedures. Strategies for SCADA
Security should complement the security measures implemented to keep the corporate network
secure.
The figure below illustrates the typical corporate network “ring of defenses” and its relationship with
the SCADA network. Successful attacks can originate from either Internet paths through the
corporate network to the SCADA network, or from internal attacks from within the corporate office.
Alternatively, attacks can originate from within the SCADA network from either upstream
(applications) or downstream (RTUs) paths. What is an appropriate configuration for one installation
may not be cost-effective for another. Flexibility and the employment of an integrated and
coordinated set of layers are critical in the design of a security approach.
MicroSCADA X 99
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
Appendix G 1MRK 511 574-UEN Rev. A
Introduction to SCADA Security
GUID-D64DB089-8882-43D0-B40B-1248FA8F93AA V1 EN-US
• Border Router and Firewalls: Firewalls, properly configured and coordinated, can protect
passwords, IP addresses, files and more. However, without a hardened operating system,
hackers can directly penetrate private internal networks or create a Denial of Service condition.
• Proxy Servers: A Proxy server is an internet server that acts as a firewall, mediating traffic
between a protected network and the internet. They are critical to re-creating TCP/IP packets
before passing them on to, or from, application layer resources such as Hyper Text Transfer
Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP). However, the employment of proxy
servers will not eliminate the threat of application layer attacks.
• Operating Systems: Operating systems can be compromised, even with proper patching, to
allow network entry as soon as the network is activated. This is due to the fact that operating
systems are the core of every computer system and their design and operating characteristics
are well-known worldwide. As a result, operating systems are a prime target for hackers.
Further, in-place operating system upgrades are less efficient and secure than design-level
migration to new and improved operating systems.
• Applications: Application layer attacks; that is, buffer overruns, worms, Trojan horse programs
and malicious ActiveX code can incapacitate anti-virus software and bypass the firewall as if it
wasn’t even there.
• Policies and Procedures: Policies and procedures constitute the foundation of security policy
infrastructures. They include requiring users to select secure passwords that are not based on a
dictionary word and contain at least one symbol, capital letter, and number, and should be over
eight characters long. Users should not be allowed to use the name of their spouse, child or pet
as their password.
The above list is common to all entities that have corporate networks. SCADA systems for the most
part coexist on the same corporate network, as seen in the figure above. The following list suggests
ways to help protect the SCADA network in conjunction with the corporate network:
• SCADA Firewalls: SCADA Systems and Industrial Automation Networks, like corporate
network operating systems, can be compromised using similar hacking methods. SCADA
systems frequently go down due to other internal software tools or employees who gain access
to the SCADA systems, often without any intention to take down these systems. For these
reasons, it is suggested that strong firewall protection to wall off the SCADA networking systems
from both the internal corporate network and the Internet be implemented. This would provide at
least two layers of firewalls between the SCADA networking systems and the Internet.
• SCADA Internal Network Design: SCADA networks should be segmented off into their own IP
segment using smart switches and proper sub-masking techniques to protect the Industrial
100 MicroSCADA X
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
1MRK 511 574-UEN Rev. A Appendix G
Introduction to SCADA Security
Automation environment from the other network traffic, such as file and print commands.
Facilities using Wireless Ethernet should use sufficient encryption, for example, WPA or WPA2.
• SCADA Server Operating Systems: Merely installing a firewall or segmenting SCADA IP
addresses will not ensure their SCADA Infrastructure is secure. An experienced hacker can
often bypass firewalls with ease and can even use Address Resolution Protocol (ARP) trap
utilities to steal Media Access Control (MAC) addresses. The hacker can also deploy IP
spoofing techniques to maneuver through switched networks. Operating systems running the
SCADA applications must also be maintained. SCADA applications on Windows NT, 2000, or
XP are properly patched against the latest vulnerabilities, and all of the default NULL NT
accounts and administrator accounts have been removed or renamed. SCADA applications
running on UNIX, Linux, Novell, or any other operating system (OS), must also be maintained as
above. All operating systems have back doors and default access accounts that should be
removed and cleaned off of these SCADA servers.
• SCADA Applications: One must also address security within the SCADA application itself.
Trojan horses and worms can be inserted to attack application systems, and they can be used to
manipulate data or issue commands on the server. There have even been cases of Trojan
horses being deployed that completely emulate the application. The operator or user thinks that
he is clicking on a command to stop a pump or generate a graph of the plant, but he is actually
clicking on buttons disguised to look like the SCADA screen, and these buttons start batch files
that delete the entire hard drive, or send out pre-derived packets on the SCADA system that turn
all outputs to the ON or “1” state. Trojan horses and viruses can also be planted through an
email opened by another computer in the network, and then it is silently copied over to adjacent
SCADA servers, where they wait until a specified time to run. Plant control rooms will often have
corporate computers with the Internet and email active on them, within the same physical room
and on the same network switches as SCADA computers. Methodologies to mitigate against
these types of situations are: the use of anti-virus software running on the computer where the
SCADA application resides; systems administrators disabling installation of any unauthorized
software unless the user has administrator access; and policies and procedures applicable to
SCADA systems,
• SCADA Policies and Procedures: SCADA policies and procedures associated with remote
vendor and supervisory access, password management, etc. can significantly impact the
vulnerabilities of the SCADA facilities within the SCADA network. Properly developed policies
and procedures that are enforced will greatly improve the security posture of the SCADA
system.
In summary, these multiple “rings of defense” must be configured in a complementary and organized
manner, and the planning process should involve a cross-discipline team with senior staff support
from operations, facility engineering, and information technology (IT). The SCADA security team
should first analyze the current risks and threat at each of the rings of defense, and then initiate a
work plan and project to reduce the security risk.
MicroSCADA X 101
Cyber Security Deployment Guideline
© 2022 Hitachi Energy. All rights reserved.
102
103
Hitachi Energy Finland Oy
Grid Automation
PL 688
65101 Vaasa, Finland