Read this document and the documents listed in the additional resources section about installation, configuration, and
operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize
themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards.
Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to
be carried out by suitably trained personnel in accordance with applicable code of practice.
If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be
impaired.
In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use
or application of this equipment.
The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and
requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for
actual use based on the examples and diagrams.
No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software
described in this manual.
Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is
prohibited.
Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment, which may
lead to personal injury or death, property damage, or economic loss.
ATT EN TI ON : Identifies information about practices or circumstances that can lead to personal injury or death, property damage, or
economic loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT
Identifies information that is critical for successful application and understanding of the product.
Labels may also be on or inside the equipment to provide specific precautions.
SHOCK HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that dangerous voltage may
be present.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may reach
dangerous temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential Arc
Flash. Arc Flash will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory requirements
for safe work practices and for Personal Protective Equipment (PPE).
2Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
4Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
Preface
This publication provides guidelines for how to use Rockwell Automation
products to improve the security of your industrial automation system.
For information on patch management options, security advisory details, and
general news and awareness on industrial security from the Rockwell
Automation Office of Product Safety and Security, see the Industrial
Cybersecurity capabilities web page.
How Can I Get Help To
Manage My Security Risk?
Summary of Changes
The Knowledgebase Technote Industrial Security Advisory Index
specific product security alerts, advisories, and recommendations. Subscribe to
this index to receive notifications.
To address specific concerns, or to report issues, contact us
at secure@ra.rockwell.com
Block.
Rockwell Automation Network & Security Services consulting services are
available to assist customers assess and improve the state of security of
industrial control systems that use Rockwell Automation and other vendor
control products. We provide a holistic approach to manage your network
infrastructure and security throughout its lifecycle. For more information, see
Industrial Cybersecurity Services
This manual contains the following new information as indicated.
Top icPag e
New chapter on vulnerabilities, how to report suspected
vulnerabilities, and how Rockwell Automation responds
to reports.
Updates to patch management31
Updates to version descriptions for software and
firmware
. Communicate securely via our PGP Public Key
.
7
33
points to
Rockwell Automation Publication SECURE-RM001E-EN-P - March 20215
Preface
Additional Resources
These documents contain additional information concerning related products
from Rockwell Automation.
ResourceDescription
Security Configuration User Manual, SECURE-UM001Describes how to configure and use Rockwell Automation products to improve the security
CIP Secur ity with Rockwell Au tomation Products Application Technique,
SECURE-AT001
Converged Plantwide Ethernet (CPwE) Design and Implementation Guide,
publication ENET-TD001
Industrial Firewalls within a Converged Plantwide Ethernet Architecture White
Paper, publication ENET-WP011
Deploying Industrial Firewalls within a Converged Plantwide Ethernet Architecture
Design and Implementation Guide, publication ENET-TD002
Guidelines on Firewalls and Firewall Policy Recommendations of the National Institute of Standards and Technology
Industrial Automation Wiring and Grounding Guidelines, publication 1770-4.1
To order paper copies of technical documentation, contact your local
Allen-Bradley distributor or Rockwell Automation sales representative.
.
6Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
Chapter 1
Vulnerabilities
A vulnerability is a flaw or weakness in a product or system that can be
exploited to compromise product or system confidentiality, integrity, or
availability.
Risk and vulnerability assessments are the starting point for any security policy
implementation. Vulnerability assessments examine your situation from
technologies, policies, procedures, and behaviors. An assessment provides a
picture of your current security posture (current risk state) and what you need
(mitigation techniques) to get to a preferred state (acceptable risk state).
Rockwell Automation recommends the formation of a multi-discipline team of
operations, engineering, IT, and safety representatives to collaborate in the
development and deployment of your industrial security policy.
A vulnerability assessment provides, at a minimum:
• An inventory of existing devices and software.
• Detailed observation and documentation of intended system operation.
• Identification of possible vulnerabilities.
• Prioritization of each vulnerability based on the impact and exploitation
potential.
The Common Vulnerability Scoring System (CVSS) is a free, open industry
standard for assessing the severity of vulnerabilities. Rockwell Automation
includes CVSS-based scores in Product Security Advisory notices to help
customers assess their risk and exposure, including how prioritize responses
and resources according to a specific threat. For more information, see
Common Vulnerability Scoring System Specification Document
The outcome of a vulnerability assessment can include mitigation techniques
that bring an operation into an acceptable risk state.
Actions that are taken after a risk assessment can include the following:
• New firewall controls
• New switch ports to lock down
• Stronger password policies
• Removal of unused software programs
• Improved procedures for managing the connection of external devices,
such as USB devices
• New or patched versions of firmware or software
.
Rockwell Automation Publication SECURE-RM001E-EN-P - March 20217
Chapter 1Vulnerabilities
How Rockwell Automation
Handles Vulnerabilities
Rockwell Automation recognizes the importance of security in industrial
control systems and is investing in its products, people, partnerships, and
integrated consulting services (Network & Security Services – NSS) to
enhance the security in our products and maintain productivity. Rockwell
Automation provides detailed and actionable information about security
vulnerabilities to help customers make informed decisions on what steps they
need to take to improve their security.
Report a Suspected Product Vulnerability
Rockwell Automation encourages submissions of suspected vulnerabilities as
soon as they are discovered. Rockwell Automation maintains a formalized
process to identify, assess, and remediate reported vulnerabilities for those
products that are in the Active or Active Mature state.
The Product Security Incident Response Team (PSIRT) at Rockwell
Automation responds to suspected vulnerabilities within Rockwell
Automation products. Reporters are strongly encouraged to file a vulnerability
report with the PSIRT via email at secure@ra.rockwell.com
The PSIRT works with reporters to understand and validate reports.
The PSIRT:
• Requests that the reporter keep any communication confidential
• Assigns a tracking ID to the vulnerability report
• Reviews and responds, usually within two business days
• Advises the reporter of significant changes in the status of any
vulnerability reported to the extent possible without revealing
information provided to us in confidence
• Works to remediate reported vulnerabilities in a timely manner.
The Rockwell Automation PSIRT encourages the encryption of sensitive
information prior to sharing over email. To request instructions on how to use
our public key, contact us at secure@ra.rockwell.com
The Rockwell Automation PSIRT may contact the reporter via email or an
another agreed upon communications mechanism throughout the disclosure
process.
.
.
8Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
VulnerabilitiesChapter 1
The PSIRT asks that reporters adhere to the following :
• Play by the rules. This includes following the guidelines, as well as any
other relevant agreements.
• Report any vulnerability discovered promptly.
• Avoid violating the privacy of others, disrupting our systems, destroying
data, or harming user experience.
• Use only our PSIRT email to discuss vulnerability information with us,
unless otherwise agreed upon with the PSIRT.
• Keep the details of any discovered vulnerabilities confidential until
Rockwell Automation identifies a resolution.
• If a vulnerability provides unintended access to data, limit the amount of
data you access to the minimum required to demonstrate the issue.
Cease testing and submit a report immediately if you encounter any user
data during testing, such as personally identifiable information (PII),
personal healthcare information (PHI), credit card data, or proprietary
information.
• Only interact with test accounts you own or with explicit permission
from the account holder.
• Do not engage in extortion.
• Comply with all applicable laws.
Public Vulnerability
Disclosure
The PSIRT discloses vulnerability details, mitigations, and solutions via the
Knowledgebase Technote Industrial Security Advisory Index
You can find additional information on the Industrial Cybersecurity
capabilities web page.
Rockwell Automation recognizes the hard work of reporters and provides
recognition within the advisories, unless otherwise specified. We recognize
reporters if they are the first to report a unique vulnerability and the report
triggers a product change.
The Rockwell Automation Vulnerability Disclosure Policy draws on the
United States Core Terms compiled by disclose.io, the vulnerability disclosure
guidance set forth by the CERT Coordination Center (CERT/CC) at
Carnegie Mellon University, and ISO 29147 and ISO 30111, which define
standards for receiving and processing vulnerability reports. Rockwell
Automation defines a reporter as an individual or organization that notifies a
vendor or coordinator of a suspected product vulnerability. Coordinators, on
the other hand, are defined as an individual or organization that coordinates
vulnerability information to affected parties.
.
Rockwell Automation Publication SECURE-RM001E-EN-P - March 20219
Chapter 1Vulnerabilities
When conducting vulnerability research according to this policy, Rockwell
Automation considers the research to be:
• Authorized in accordance with the Computer Fraud and Abuse Act
(CFAA) (and/or similar state laws). Rockwell Automation will not
initiate or support legal action against you for accidental, good faith
violations of this policy.
• Exempt from the Digital Millennium Copyright Act (DMCA).
Rockwell Automation will not bring a claim against you for
circumvention of technology controls.
• Exempt from restrictions in our Terms & Conditions that would
interfere with conducting security research. Rockwell Automation
waives those restrictions on a limited basis for work done under this
policy.
• Lawful, helpful to the overall security of the Internet, and conducted in
good faith.
If at any time you have concerns or are uncertain whether your security
research is consistent with this policy, please email secure@ra.rockwell.com
before going any further.
.
Supply Chain Vulnerabilities
Threat Model
Rockwell Automation also prioritizes supply-chain vulnerabilities, especially if
a vulnerability affects more than one Rockwell Automation product. The
PSIRT accept reports regarding third-party components if the vulnerabilities
are disclosed in a multi-party, coordinated effort supported by a third-party
coordinator such as DHS CISA or the CERT/CC.
Threat modeling is a procedure to analyze network, application, and physical
security. A threat model identifies objectives and vulnerabilities, and then
defines countermeasures to mitigate the effects of threats to the system.
1. Describe the assets to protect.
Create classes of assets and information that you want to protect. For
example, a controller, the controller configuration, or recipe data in the
controller. Be as specific as possible. For example, include the following:
• serial number
•MAC ID
• IP address
•user access
• device dependencies
Prioritize the assets. Define the type of protection for each asset confidentiality, integrity, or availability.
10Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
VulnerabilitiesChapter 1
2. Describe the policies that govern the assets
The policies are typically control-based in that they define who can do
what to which asset. Other policies can define attributes such as asset
availability, version control, or confidentiality requirements.
Because policies are written in a general manner, they are supported with
procedures, standards, and guidelines to provide the details on how to
implement, enforce, and monitor the policy.
3. Characterize the assets and their supporting systems
Examine the assets in their information systems and identify
information flows that affect the assets. Characterize the systems and
software that are part of the information flow.
• How are the assets accessed?
• Who can copy, move, or modify them?
• What methods can be used to interact with them?
• Do they exist in multiple locations?
• How are multiple copies synchronized?
4. Identify threats to the assets
For each asset, identify how and where to enforce the policy that governs
the asset. Based on the type of protections for the asset, examine the
information flows, systems characterizations, and enforcement
mechanisms. Identify potential threats (such as threats to
confidentiality, threats to integrity, and threats to availability).
For example:
• ‘System goes off line’ is a threat to availability.
• ‘Database synchronization fails’ is a threat to integrity.
5. Characterize the threats
For each threat, enumerate the mechanisms (vulnerabilities) that can
cause the potential threat to become an actual threat. Keep the
vulnerabilities as broad as possible in scope.
6. Visualize
Use a network diagram and overlay system information, asset locations,
information flows, enforcement points, and vulnerabilities. Annotate
the diagram with available resources (people, money, equipment).
Use this visualization as a method to divide the system into manageable
pieces. This visualization also shows relationships and possible
consequences when you make changes.
Rockwell Automation Publication SECURE-RM001E-EN-P - March 202111
Chapter 1Vulnerabilities
7. Strategize
Use the visualization to find:
• Patterns that suggest enterprise-wide solutions rather than local or
point solutions.
• Interactions of resources and ease of affecting the network.
• Possibilities of vulnerabilities being exploited.
• Develop backup and restore procedures.
Group vulnerabilities and their locations. Identify methods to address as
many of the vulnerabilities as possible with one change or small set of
changes.
Remember that not all vulnerabilities need new technology to address
the issues. Proper configuration, privilege, and access control are key, and
can often be improved without harming production facilities.
8. Verify
• Map every proposed change directly to a threat to an asset.
• Make sure that the change does not introduce a new threat to another
asset.
Verify that no policy enforcement point can be circumvented.
12Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
Chapter 2
RESET
SERIAL
CON / AUX
GE WAN 0
5VDC
-4.QA
FE 1SLFE 0
SL
FE 3SLFE 2
SLSL
SYS
ACT
LAN
EIP Mod
EIP Net
Setup
GPS
TimeCD
3 1
4 2
Out
1 2
Speed
Duplex
PRP
DLR
PoE
Alarms PSU
12345 6789 1011122526
13
1458912
10/100/1000 PoE+
100/1000 SFP
100/1000 SFP+
GPS ANT. DIG.TimeCode ANA.TimeCode
Console Alarm
TOD
16 17 20 21 24
25
OUTINOUT
IN
28
2724212223201718191613 14 15 28
Express
Setup
Disp.
Mode
L
NHiL
N
Hi
Lo
100-240V-, 50-60Hz, 2A
100-250V , 2A
24-60V , 10A 24-60V , 10A
100-250V , 2A
100-240V-, 50-60Hz, 2A
Lo
PSU1 PSU2
ModuleStatus
NetworkActivity
NetworkStatus
1734-AENT
Point BusStatus
SystemPower
FieldPower
ModuleStatus
NetworkActivity
NetworkStatus
1734-AENT
Point BusStatus
REDUNDANCY MODULE
OK
COMM
PRI
D+
D-
MBRK
SHLD
IN1
1
2
IN2
COM
W
V
U
+
-
Mod
Net
5500S2
32791M
Internet
Plant/Enterprise LAN
Firewall
Firewall
Firewall
Process LAN
Level 3
Levels 0… 2
Levels 4 and 5
System Security
Just as the nature of manufacturing and industrial operations has changed, so
have the security risks. More connected operations can create more potential
entrance points for industrial security threats. Threats can come in many forms
– physical versus digital, internal versus external, or malicious versus
unintentional.
In the industrial automation and control system (IACS), follow common
industry standards, such as the Purdue Enterprise Reference Architecture
model, to define:
• Security zones - those assets that have the same security requirements
Rockwell Automation Publication SECURE-RM001E-EN-P - March 202113
• Trusts within security zones - relationships between assets that support
identification, authentication, accountability, and availability.
Chapter 1System Security
Industrial security must address a wide range of concerns, including:
• Safeguard intellectual property and other valuable information.
• Safeguard operations from intrusions that could impact productivity,
product quality, operator safety, or the environment.
• Maintain critical infrastructure systems, especially systems in regulated
areas like energy and water/waster-water management.
• Maintain high-availability traffic policies for networks.
• Enable and control remote access to industrial operations.
Security Basics
Industrial security must be comprehensive. Extend security policies from the
enterprise through the plant level and to end devices. Address risks across your
people, processes, and technologies. Involve collaboration between IT and OT
personnel for design, management, and regular communication on expected
system functional requirements and policy compliance.
A robust approach to security includes the development and implementation
of the appropriate activities to complete the following steps:
• Identify the cybersecurity risk to systems, assets, data, and capabilities.
• Protect critical infrastructure services.
• Detect cybersecurity events.
• Respond to a detected cybersecurity event.
• Recover from and restore any capabilities or services that were impaired
due to a cybersecurity event.
Cybersecurity is the collection of technologies, processes and practices that
help protect networked computer systems from unauthorized use or harm.
Cybersecurity addresses cyber- attacks, which are offensive in nature and
emphasize network penetration techniques, and cyber-defenses, which are
defensive in nature and emphasize counter-measures intended to help
eliminate or mitigate cyber- attacks.
The main goals of cybersecurity in an industrial setting:
• Availability: maintain and never give up control in a control system
• Confidentiality: protect proprietary information and only let
individuals with a need-to-know have access to the information
• Integrity: ensure that the information flowing through the system has
not been tampered with
14Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
Security Standards
There are a number of resources that organizations can use as a basis to manage
security and risk within the IACS. These resources can help organizations
develop a security management program.
ResourceDescription
ISA/IEC 62443 Standard Industrial Automation and Control Systems (IACS) Security (formerly ISA-99)
This standard addresses network and system security and defines the provision of multiple security protections,
especially in layers, with the intent to delay, if not block, an attack.
This standard a lso recommends password structures.
NIST 800-82
Framework
NIST Cybersecurity
Framework
NCCIC AgencyNational Cybersecurity and Communications Integration Center
Guide to Industrial Control Systems (ICS) Security
This framework provides recommendations for securing an IACS. The standard covers the use of firewalls, the
creation of demilitarized zones and intrusion detection capabilities, along with effective security policies, training
programs, and incident response mechanisms.
This framework provides guidelines that help organizations align cybersecurity activities with business
requirements, risk tolerances, and resources.
This agency provides recommendations for secure architecture design.
The United States Department of Homeland Security (DHS) includes the
Cybersecurity & Infrastructure Security Agency (CISA). CISA manages a
repository of alerts, advisories, and reports (ICS-CERT) for industrial control
systems.
• Alerts: provide timely notification to critical infrastructure owners and
operators concerning threats to critical infrastructure networks.
• Advisories: provide timely information about current security issues,
vulnerabilities, and exploits.
• Reports: provide Technical Information Papers (TIPs), Annual Reports
(Year in Review), and 3rd-party products applicable to industrial control
system owners/operators.
• Newsletters: periodic publication of security news and information
applicable to industrial control system owners/operators.
System S ecurityChapter 1
For more information, see Cybersecurity and Infrastructure Security Agency >
Industrial Control Systems
.
Defense-in-Depth Security
Industrial security is best implemented as a complete system across your
operations. Common to security standards is the concept of defense-in-depth
(DiD). DiD security establishes multiple layers of protection based on diverse
technologies through physical, electronic, and procedural safeguards. Just like a
bank uses multiple security measures – such as video cameras, a security guard,
and a vault – DiD helps make sure that threats encounter multiple lines of
defense. DiD also assumes the implementation of cybersecurity policies that
include operations planning, user training, and physical access security
measures.
Rockwell Automation Publication SECURE-RM001E-EN-P - March 202115
Chapter 1System Security
A defense-in-depth security approach consists of six main components:
• Policies and Procedures
•Physical
•Network
•Computer
•Application
•Device
Defense-in-depth employs a comprehensive approach to leverage multiple
methods to mitigate risks. To apply defense-in-depth, understand the
relationship of intruders (threats and threat actors) and vulnerabilities to the
controls (standards, detection methods, and countermeasures).
A threat actor, through intent, capability, or opportunity, poses a threat to the
IACS when the threat compromises operations, personnel, or technology and
exploits an existing weakness or vulnerability. Base countermeasures on best
practices, standards, and established company security policies.
Countermeasures protect critical assets through multiple layers of defense.
Organizations must constantly adjust and refine security countermeasures to
maintain protection against known and emerging threats.
Notifications That Rockwell Automation Provides
Rockwell Automation provides these types of product notices.
NotificationDescriptionCustomer Action
Product Safety Advisory (PSA)Issued when a product failure may result in significant loss of capital equipment,
Product Notice (PN)Issued when a product failure may result in significant commercial loss or customer
Product Security AdvisoryIssued for security alerts and security recommendations where such risks stem
Security with Rockwell
Automation Products
personal injury, or death.
dissatisfaction.
from cyber-attacks.
These advisories are intended to raise customer awareness of risks to affected
product operation or performance and also supply relevant recommendations for
how to reduce or remove the risk associated with a vulnerability.
Security is not a static end state, it is an interactive process. No single
product, methodology, or technology fully secures control networks. The
remaining chapters in this reference manual highlight Rockwell Automation
products that help manage:
• Identification, authentication, and user access
•Network segmentation and data flow
• Data confidentiality
• System integrity
• Resource availability and response to events
Required
Strongly Recommended
Strongly Recommended
16Rockwell Automation Publication SECURE-RM001E-EN-P - March 2021
System S ecurityChapter 1
Standard Security Components
In addition to the Rockwell Automation products described in this
publication, there are also references to these additional technologies.
ComponentDescription
Microsoft® Active Directory serviceUse Active Directory for authentication and authorization in a Windows domain.
Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in
most Windows Server operating systems as a set of processes and services.
A server that runs the Active Directory Domain S ervices (AD DS) is called a domain controller. The domain controller
authenticates and authorizes all users and computers in a Windows domain type network. The domain controller
assigns and enforces security policies for all computers and software updates.
RADIUS protocolYou can use the Remote Authentication Dial-In User Service (RADIUS) protocol to manage access to the Internet or
Cisco® TACACS+ protocolYou can use the Cisco Terminal Access Controller Access-Control System Plus (TAC ACS+) to manage remote
IEEE 802.1x authenticationYou can use 802.1x authentication to manage port-based access for devices that want to connect to a network.
internal networks, wireless networks, and integrated email services.
The RADIUS protocol is a network protocol that provides centralized authentication, authorization, and accounting
(AAA) management for users. The RADIUS protocol is often used by Internet service providers (ISPs) and enterprises
to manage access to the Internet or internal networks, wireless networks, and integrated email services.
authentication for networked access control through a centralized server.
The Cisco TACACS+ protocol manages authentication, authorization, and accounting (AAA) services. The TACACS+
protocol uses the Transmission Control Protocol (TCP). Since TCP is a connection-oriented protocol, TACACS+ does
not have to implement transmission control. TACACS+ encrypts the full content of each packet.
802.1x authentication secures communication between authenticated and authorized devices. You can connect this
access control to the Active Director y to create a central administration connection for both network mana gement
and network access. This access control is the preferred method to create a central network access layer.
Rockwell Automation Publication SECURE-RM001E-EN-P - March 202117
Loading...
+ 39 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.