Effective September 2016 New information White Paper WP048001EN Cybersecurity concerns? Secure remote access with your operator interface Kerry Sparks Product Manager Automation product solutions Eaton This white paper reviews the benefits of remote access and the necessary steps to take to ensure secure connectivity in an environment where the threat from Internet cyber-attack is real and pervasive. Products and revisions Vendor Product Eaton Applicable revision XV and XP operator V7.1 and 8.0 interface systems with of Visual Visual Designer Tested revision V7.1 and 8.0 of Visual Supporting documentation Manual name Reference number XP-503 OS User Guide XP-503 Manual XV-1X2 Quick Start Guide XV OS Manual V2.25x XV-102 Manual XV-152 Manual XV-303 Manual MN04801006E MN04802003Z-EN MN0480001E M000174-22 MN04802004Z-EN MN04802006Z-EN MN048017_EN Application details When a customer has a problem with a machine or control system not properly functioning for whatever reason, it is important to be able to quickly diagnose the cause of the problem and take corrective action. Without remote connectivity to the machine, it can be difficult to do this in a timely and cost-effective manner; travel to another physical location to determine the source of a problem, or provide other technical support. It has been reported that “Having access to information and being able to take corrective action remotely decreases field service costs by $1K to $5K per trip.” At the same time, remote connectivity also adds risks for the customer. We continue to hear daily news stories about cyber criminals, cyber hactivists, cyber terrorism, and even state-sponsored cyber-attacks. The Stuxnet virus was a wakeup call for automation suppliers who assumed that their systems couldn’t be targeted for attack. And, as the use of BYODs (Bring Your Own Devices) such as smart phones, tablets, and other mobile devices continues to grow in the manufacturing sector, we are starting to see them become targets for cyber-attacks as well. Although Android is experiencing more security issues today due to its more open platform, we can’t assume that iOS devices are not vulnerable, too; the recent decision by Apple® to pay hackers for discovering and reporting security bugs is indicative of the current realities. Amidst this backdrop, it’s easy to see why cybersecurity is a core focus of all IT departments. This means it is crucial that you understand the means necessary to be able to create a secure environment in which you can provide remote access services. Understanding how to mitigate such risks to provide secure remote access can prevent production disruption while reducing support costs. Key remote capabilities While remote access can mean different things to different people, each of these varying facets can be needed in any given situation. For that reason, it is helpful to begin with some basic remote access terms and the capabilities they describe: The general ability for technical experts to manage a machine or process from afar as if they were standing right in front of the operator interface themselves provides the most basic definition of a remote desktop environment. The remote desktop generally makes it possible to fix problems and get everything up and running again quickly from almost any location at any time. White Paper WP048001EN Cybersecurity concerns? Secure remote access with your operator interface Effective September 2016 Traditionally, remote environments are enabled by Thin Client Connectivity over the Web and File Transfer Protocol (FTP). Thin Client Connectivity leverages standard Internet technology and browsers, such as Internet Explorer®, to log into a machine’s control and information system from another location in order to view the same screens to which the machine’s operator has direct access. Once connected, the FTP makes it possible to send and receive files such as historical logs; archived data files and databases; or event triggered alarms that can then help the remote experts troubleshoot machine issues more quickly. • VPN (Virtual Private Network)—VPN is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible. A VPN provides security so that traffic sent through the VPN connection stays isolated from other computers on the intermediate network. Some routers can create one or more VPNs that allow secure connections from the Internet to computers within a plant network. Most VPN providers also incorporate SSL encryption. • Deep packet inspection—This is a form of network packet filtering that examines the data portion (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions, or other defined criteria. It can then decide whether the packet may pass, be blocked, or if it is to be routed to a different destination. HMI/SCADA application software includes the capability to automatically generate Web screens from the same screens generated for local use and saves significant development time and cost. A Development Software Interface provides the ability for the HMI/SCADA developer to connect to the remote system, upload and download files, and make changes to the application on-the-fly over the Web to facilitate enhancements and bug fixes to the application. These abilities will prevent problems in the future and improve the user interface without disrupting production by forcing a shutdown of the running application. The ability to configure alarms and events to automatically generate text messages and emails to both plant and remote personnel can prevent production disruption and minimize machine downtime. Remote Annunciation capabilities are typically included in software applications and mobile apps as email or text messaging alert features. Beyond the standard remote access environment, evolving mobile technologies now provide additional remote access and machine support. Smart Phone, iOS, and Android APPS extend remote capabilities both to and through a growing suite of ubiquitous computing tools. APPS created for mobile non-Windows® devices use both text and graphical formats to provide real-time alarm notification and information, or to simplify and enhance the remote control of key processes. Certain routers and passive network devices are commercially available, which incorporate this technology to filter messages at the application protocol layer (such as Modbus® TCP or EtherNet/IP). • Network segmentation—Segmenting the network into functional areas using intelligent routers provides additional layers of security. The more layers of security that exist, the more difficult it is for cyber criminals to compromise the security of the manufacturing line and its control system. Network segmentation provides a mechanism to create “air gaps” that isolate the control system from a plant or office network in the event other segments of the network are under attack. The air gap essentially unplugs the router’s uplink to the rest of the network and remote connectivity is disrupted while the manufacturing line is still allowed to continue to run in this “worst case scenario.” • Non-corruptible operating systems—Despite all the network security measures taken, sometimes an engineer or operator can introduce a virus into the network by just plugging an infected USB memory stick into a PC behind the firewall and routers. For this reason, some Windows-based HMI/SCADA systems offer a protected mode operating system. In the event that the machines do contract a virus or other malware, the problem can be cleared with a simple reboot that will get the machine running much more quickly than a backup to a restore point (assuming a good restore point is even available). • Web conferencing—Web conferencing tools such as WebEx from Cisco provide on-demand collaboration, online meeting, Web conferencing, and videoconferencing applications. Because these on-demand tools and their security mechanisms are familiar to company IT groups, and because it typically requires both ends of the conference to initiate a connection, Web conferencing is another way of granting remote access to OEMs and other non-VPN users without the risk of exposing the network to unwanted users. Yet, despite all these capabilities, it is extremely important to remember that remote access should never disrupt the operator’s own immediate ability to change screens and control the machine independently. Machine control and interaction through direct physical presence is often required as the most failsafe means of ensuring optimal human safety or responding to an emergency. Security technologies Once any type of remote access is enabled, security risks are inevitably introduced; however, a wide array of technologies has emerged to help guard against vulnerability. Technologies that support secure remote access include the following: • Firewalls—Firewalls help keep a network secure by controlling the incoming and outgoing network traffic. The firewall can be either software- or hardware-based, but its primary objective is to analyze data packets based on a rule set to predetermine whether or not the packets should be allowed to pass onto the network. Many routers that pass data between networks contain firewalls and/or firewall components. • SSL (Secure Socket Layer)—Found in outgoing email and incoming (HTTPS) network access, SSL encryption is important to help prevent unwanted access to information about the machine. 2 EATON www.eaton.com Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 Security threat vectors Figure 1 below represents what a typical mid- to large-size plant information and control network may look like to the engineer who is designing methods to enable remote access and support. However, the corporate IT manager may see the network more like that shown in Figure 2. Figure 1. EATON www.eaton.com 3 White Paper WP048001EN Effective September 2016 Cybersecurity concerns? Secure remote access with your operator interface Figure 2. The IT department may seem like the “Preventers of Information Services” as Dilbert might say, but recent history shows that they are not paranoid. They are just keenly aware of the dangers lurking in cyberspace, which can make your life and their life miserable. As they say, you are not paranoid if everybody really is plotting against you. Security threat vectors are those paths that malware may use to infect the plant network. In Figure 2, those paths include: • External users accessing the network through the Internet • Misconfigured firewalls • Unsecure wireless routers and wired modems • Laptops infected elsewhere that can plug into the network behind the firewall • Infected USB keys and PLC Logic programs • Unsecure RS-232 serial links In the next section, you will see how Eaton’s operator interface solutions provide the necessary tools to mitigate risks associated with all these various threats to bring down the manufacturing environment. 4 EATON www.eaton.com Eaton operator interface products Eaton offers several families of operator interface products and software to meet a wide range of user requirements. The three families discussed here are XV hardware platforms with Visual Designer SCADA software, and XP hardware platforms with Visual Designer. XV hardware platform There are three families of XV hardware—XV-102, XV-152, and XV-303. From a functional standpoint, the XV-100 family is identical to these with the only differences being that the XV-102 models (available in 3.5-, 5.7-, and 7-inch widescreen touchscreens) have a plastic composite frame while the XV-152 models (available in 5.7-, 8.4-, and 10.4-inch touchscreens) have an aluminum metal frame. They both run on a Windows CE 5 operating system. The XV-300 family has higher performance and higher capacity than the XV-100 family and comes in either a 7- or 10.1-inch widescreen display with a multi-touch, projected capacitive touchscreen (PCT). The XV-300 runs on the Windows Compact Embedded 7 Professional OS. Cybersecurity concerns? Secure remote access with your operator interface While the OS components vary somewhat between the models that run Visual Designer, the functionality of the hardware is fundamentally the same. They all share a number of remote network access capabilities that include: • • • • Remote desktop server (VNC Gateway)—Allows remote users to take control of the XV unit from either their PC or from any device that supports a VNC Client (Virtual Network Computing), such as an iPad® or Android. The Remote Desktop Client is an executable that is available for free download from the Eaton website. To run the client from your PC, you simply select the IP address of the device, provide a valid password, and take control remotely. The VNC Gateway links a VNC Client from a PC, iPhone®/iPad, or Android to the Remote Desktop server, where the VNC Client takes the place of the Remote Desktop Client. You can either download and install a VNC Viewer for a PC for free or purchase the APP from the iTunes® Store or Google Play® (~$10). The Remote Desktop server uses port 51738 whereas the VNC Gateway uses port 5900. FTP server—Allows remote users to view and upload/download files to and from the XV’s file system over a network. This can be used to remotely update the XV’s operating system, modify its startup through the Autoexec.bat files, or make changes to the running application through the file transfer interface of FTP (File Transfer Protocol). From your PC, you can open Windows Explorer/My Computer and enter the following in the address property: ftp://ipaddress. For example, if the XV is at IP address 192.168.1 23, you would type: ftp://192.168.1.23 and then provide a valid password for the FTP server. This will allow the XV unit to browse and manage the file system of the XV. The FTP server uses ports 20 and 21 (data, command). Web server—Allows remote users to use either a standard browser (Internet Explorer, Google Chrome, Firefox, etc.) or the Visual Designer Secure Viewer service, to view and/or control the Visual Designer application as standard HTML files as an independent user interface. This means that the local client (operator) and the remote client (Web viewer) have independent access to the project screens based on the login user credentials provided. So depending on what user and password are provided when logging on remotely, the remote user may have access to screens that are not available to the local operator and vice versa. The remote client can be limited to “view-only” access or “view and control.” If the project allows remote control, then the control access is based on the remote user’s login account settings. For mobile devices like iPad/iPhone or Android users, plus any PC-based browser other than Microsoft Internet Explorer, such as Google Chrome, Safari, Firefox, etc., the Mobile Access interface is HTML5 compatible and provides independent graphical, alarm, and trend controls. The Web server interfaces all use ports 80 (HTML server) and 1234 (TCP/IP data server). In addition, CoDeSys software, which also runs on XV units, offers a Web server using the same ports. Remote program download agent (server)—Allows upload, download, and licensing services to the Visual Designer editor for easy-to-use application project management. The Remote Agent (CEServer) running on Visual Designer XV units uses a password for remote access authentication. The Visual Designer remote program agent uses port 4322. White Paper WP048001EN Effective September 2016 XV OS corruption protection There are two design features in the XV’s implementation of the WinCE 5 and WinCE 7 operating systems that protect its integrity in the event of a breach in security where malware attempts to attack any vulnerabilities in the operating system or application software. • Registry Save function—The WinCE Registry Save function is disabled in the XV’s OS implementation and cannot be enabled. Hacks in the Windows registry are a common target for malware and can be very difficult to find, much less correct. With the XV, recovery from such an attack to the Windows registry is accomplished with a simple power cycle of the unit. Instead of incorporating a Registry Save function, all desired registry changes are accomplished through batch files like the Autoexec. bat file and Registry (.Reg) files. • Core OS components—The XV’s core operating system components are located in a read-only flash resource that is not accessible to the runtime OS. This means that any security breach that attempts to either install or remove key OS components can easily be corrected by completely deleting the OS folder from the InternalStorage or StorageCard (SD) drive and copying the OS folder back using an SD Card, USB memory device, or FTP connection. The accessible OS folder only contains add-on components to the core OS components, allowing for fast recovery from any type of malware attack, while also supporting simple OS revision changes. This also ensures that users cannot accidentally corrupt the OS to an unrecoverable state. XP hardware platform The XP-503 platform is essentially a Panel PC with a 1.65 GHz dualcore AMD processor with a Radeon graphics co-processor, 4 GBytes of DDR3 memory (DRAM), a 32-GByte internal mSATA solid-state “C” drive, and a 4-GByte external, removable CFast “D” drive with a 4000 tag Visual Designer software license. The XP-503 models have three screen size options—10.1-, 15.6-, and 21.5-inch TFT displays with multi-touch PCT touchscreens and scratch-resistant safety glass. All XP models run on a Windows Embedded Standard 7 operating system and all are licensed to run Visual Designer software that comes preloaded and includes a pre-activated runtime software license for 4000 tags and one Web server license for each of the three types of Web servers, thin client, secure viewer, and mobile access. All share the following mobile access capabilities: • Remote desktop server—While the standard Windows remote desktop server is included with every XP model, it is recommended that the user install one of the various VNC servers available for free download on the Web. Eaton has tested and supports UltraVNC as well as RealVNC on the XP hardware platforms. Each will allow remote users to take control of the XP unit from either their PC or from any device that supports a VNC Client (Virtual Network Computing), such as an iPad or Android. For your PC, all you need to install are the VNC client components. Running the client from your PC, you select the IP address of the device, provide a valid password, and take control remotely. The VNC server also supports the VNC client from an iPhone/iPad or Android. You can purchase the VNC Client APP from the iTunes Store or Google Play (~$10). The VNC server uses port 5900. Each of these remote services has an independent password so you can choose which users are able to perform which remote functions. Knowing which ports are used by each remote access service allows you to set up your router/firewall/VPN server for either blocking or forwarding requests for that port to the appropriate device. The Web servers for Visual Designer and CoDeSys use the built-in security setup that each program offers. More details on those features are available in the software security descriptions addressed later in this paper. EATON www.eaton.com 5 White Paper WP048001EN Cybersecurity concerns? Secure remote access with your operator interface Effective September 2016 • • • FTP server—Allows remote users to view and upload/download files to and from the XP’s file system over a network. This works a little differently from the XV unit in that specific locations— called Virtual Directories—need to be added to the default FTP server under Internet Information Services (Control Panel > Administrative Tools). By default, there are two FTP Virtual Directories configured. The first is called CFG and it points to the root directory of the D drive with Read/Write privileges. The second is called CDrive and it points to the root directory of the C drive, but has Read-Only privileges. From your PC, you can open Windows Explorer/My Computer and enter the following in the address property: ftp://ipaddress/VirtualDirectoryName. For example, if the XP is at IP address 192.168.1.100, you would type: ftp://192.168.1.100/Cfg to view and change files on the D drive. You must first disable the Firewall on the XP unit (Control Panel > Windows Firewall) and if going through a router, it is recommended that you use port forwarding and MACID filtering to secure the FTP service for the XP unit. The FTP server uses ports 20 and 21 (data, command). Web server—Allows remote users to utilize a standard Microsoft Internet Explorer browser or the Visual Designer Secure Viewer service, to view and/or control the Visual Designer application as standard HTML files in an independent user interface. This means that the local client (operator) and the remote client (Web viewer) have independent access to the project screens based on the login user credentials provided. So depending on what user and password are provided when logging on remotely, the remote user may have access to screens that are not available to the local operator and vice versa. The remote client can be limited to “view-only” access or “view and control.” If the project allows remote control, then the control access is based on the remote user’s login account settings. For mobile devices like iPad/iPhone or Android users, plus any PC-based browser other than Microsoft Internet Explorer, such as Google Chrome, Safari, Firefox, etc., the Mobile Access interface is HTML5 compatible and provides independent graphical, alarm, and trend controls. The Web Server interfaces all use ports 80 (HTML server) and 1234 (TCP/IP data server). Remote program download agent (server)—Allows upload, download, and licensing services to the Visual Designer editor for easy-to-use application project management. The Remote Agent (also called CEServer on XP units) running on XP units uses a password for remote access authentication. The Visual Designer remote program agent uses port 4322. Each of these remote services has an independent password so you can choose which users are able to perform which remote functions. Knowing which ports are used by each remote access service allows you to set up your router/firewall/VPN server for either blocking or forwarding requests for that port to the appropriate device. The Web server for Visual Designer uses the same built-in security setup that is utilized for local access on the XP unit. More details on those features are available in the software security descriptions addressed later in this note. One key difference between the Visual Designer security capabilities when running on an XP platform is that you can incorporate a Windows Active Directory service for a Windows domain within the Visual Designer interface, called LDAP (Lightweight Directory Access Protocol). This is a powerful feature that allows one or more XP units to have their security administered by the Windows domain on which they participate. Another key difference between the XP and XV hardware platforms is that the XP platform has support for SSL (Secure Socket Layer) encryption for email servers. The email capabilities are another remote feature supported by Visual Designer for alarm or event annunciation or for sending file attachments; however, SSL encryption is preferred by most email servers, and in fact, most modern servers will not support email that does not use SSL. 6 EATON www.eaton.com XP OS corruption protection There is one key design feature in the XP’s implementation of the Windows Embedded Standard 7 operating system that protects its integrity in the event of a security breach where malware attempts to attack vulnerabilities in the operating system or application software. • Protect Mode®—Microsoft Windows Embedded operating systems offer a unique feature called the Enhanced Write Filter (EWF). Eaton has incorporated this feature into a set of tools called Protect Mode. The EWF is enabled by default for the entire operating system partition (C drive) that prevents writing directly to the drive. Instead, any changes are temporarily held in volatile DRAM until the unit goes through a power cycle, at which time the changes are all discarded. Hacks in the Windows registry and changes to Windows components are a common target for malware and can be very difficult to find, much less correct. With XP’s Protect Mode, recovery from such an attack to any Windows or Visual Designer component or service is accomplished with a simple power cycle of the unit. What Protect Mode utilities offer is a mechanism for the user to install or update software and drivers and to make changes in OS components or settings while the EWF is enabled, and then select Commit to implement those changes permanently to the C drive (CompactFlash® device). During the Commit process, also termed Protect Mode Save, the system takes all the temporary changes since power up and makes them permanent through a reboot process. When rebooted, the EWF is still enabled and the unit is still protected. Another feature of Protect Mode is the ability to disable the EWF so that large or complex installations can be done more easily and after which the Protect Mode feature can be re-enabled. Not only does this Protect Mode feature protect the unit from malware, it also minimizes the overall preventive maintenance required by normal Windows PCs in a factory environment. On a typical factory floor PC, you need to install anti-virus software and apply weekly—if not daily—virus definition updates as well as monthly Windows Security patches. For obvious reasons, these activities are not performed while the unit is being used in the manufacturing process and must be done during scheduled downtime periods. Furthermore, to prevent a lengthy restore process in the event of either a hardware failure or a security breach where, despite all security efforts the PC becomes infected in some way, periodic backups of the PC’s Windows drive (hard drive or solid-state drive) need to be performed. This is to prevent the time-consuming process of applying numerous cumulative patches after a Windows reload. All of this preventive maintenance by skilled PC technicians is unnecessary with an Eaton XP unit because with Protect Mode, the operating system drive doesn’t change. The fact that the XP has all solid-state drives and no fans or other moving components also means that you have fewer hardware failures from rotating media or cooling devices. Visual Designer software security features The security system built into Visual Designer projects is very flexible and covers both runtime and development security. Here we will focus only on the runtime security features that address network security. The goal of Visual Designer security is to complement network and physical security for a complete, security in-depth approach, with multiple strong security features throughout. Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 Security groups Visual Designer security is modeled after Windows security in that you have Security Groups (e.g., power users, administrators, guests, etc.) wherein access privileges are defined, and then users with user names and passwords who are assigned membership in one or more security groups. The group settings are shown in Figure 3. • The Security Level—Runtime for each group is what dictates screen access and command access (pushbutton and value entry). Each screen and each object that can affect a tag value through user input has a security level property value assigned (default value 0). Leaving the value at zero ensures that every user has access to the screen or command. Assigning any number between 1 and 255 ensures that only users who are members of a group that includes that security level in their Security Level— Runtime range will have access. If the logged-on user does not have access when they attempt to go to an inaccessible screen or click/touch a control object, nothing will happen. If the developer wishes to hide controls or change their appearance based on current access level, there are system tags that the security system interacts with which can be used to do so. These system tags include UserName and GroupName (text) plus GroupLoLevel and GroupHiLevel (integer). All groups automatically have access to level 0 screens/objects, so it is easy to create security groups that are hierarchical or functional. If a group’s level is set to 10–20, for instance, then members of that group have access to screens/objects in that range as well as to those set to zero. Figure 3. Under the button labeled Advanced… are additional properties for groups, as shown in Figure 4. EATON www.eaton.com 7 White Paper WP048001EN Cybersecurity concerns? Secure remote access with your operator interface Effective September 2016 Figure 4. In the Password Options tab, you can set rules to ensure strong passwords; and, with password aging, you can ensure that passwords are changed periodically. In the Auto LogOff/LockUp tab, you can make sure that members of a group are automatically logged off after a specific time period or inactivity period as well as ensuring that if someone tries to log in repeatedly and fails that the account is locked out to prevent someone trying to log in as another user. Security modes Visual Designer supports three different mechanisms for administering security. • Local only—The security system is administered within the local project for a single runtime instance of Visual Designer. This is the simplest and most common mode. • Distributed client/server—This mode is designed for applications where there are multiple runtime units networked together locally; one project/unit is deemed the Security Administration server; and, all other projects are clients to the one server. This central administration approach makes sense in an environment where there are common users among multiple systems with a common set of privileges to administer. This simplifies the task of defining, maintaining, and modifying security for such multi-unit applications. • Domain (LDAP)—This mode is designed for users who want the Visual Designer security system to be administered by the Windows Domain’s Active Directory services. The Lightweight Directory Access Protocol (LDAP) is a recognized standard for managing users and groups across many different applications on a network. When this mode is selected, the project gets its users and groups from an LDAP-compliant domain server, such as Microsoft Active Directory for Windows or OpenLDAP for Linux. In this mode, the user names, passwords, and group memberships are taken from the domain and specific rights are configured within the project. For customers with domains, this feature greatly simplifies security administration in Visual Designer projects because they can use powerful Windows security tools with which they are already familiar. This feature may be used with XP models, but this mode is not supported on XV models. You can create as many security groups as you like in the development environment, but cannot add or modify group settings during runtime. There are a number of runtime functions you can do for users, such as changing passwords, creating and deleting users, locking and unlocking users, and exporting and importing the security system to an encrypted file, etc. Security users You can create as many users as you like in the development environment, and add, delete and modify user settings at runtime. User settings include the User Name and Password plus group membership assignment. Password rules apply based on the settings for the group to which the user is assigned and a user may be a member of more than one Security Group, in which case, the user inherits all privileges from all assigned groups. 8 EATON www.eaton.com Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 Managing security How to secure the network In the security configuration dialog, you may assign a Master Password for the entire project that must be used when importing an exported security file. This provides an extra layer of protection so that an encrypted security file cannot be un-encrypted without the Master Password. Once the security system has been configured, it may be exported and imported into other Visual Designer projects from within the development environment. The runtime environment also allows importing and exporting the security system so that when making runtime changes to the security system you can make sure those changes are automatically exported so they can be imported at the next project startup. The following are some of the runtime functions for security: The level of remote access and the nature of the network infrastructure will have a major effect on the task of securing your network hardware. For instance, if you work in a large distributed corporation with offices all over the world and VPN access available to all your remote support individuals, then much of the work is already done at the Internet access level. The IT department will have secure firewalls in place and VPNs set up to access the plant network remotely. In this case, you will need to provide a list of ports that you need to have open to certain individuals and have them forwarded to the appropriate equipment on the network. If instead you have a small site with a single Internet connection and you want to allow remote access, then you will need to completely configure your security from the Internet connection through to the piece of equipment you need to access. • Create/Remove User—Add new users and delete existing user accounts • Set Password—Specify a new user password • Block/Unblock User—Temporarily block a user from access and unblock users who have been blocked • Get User State—Determine the block/unblock status of a user • Get User Names—Get a list of users and optionally their groups • Get User Password Aging—Returns the time remaining before the password for a specific user expires • Import/Export Security System—Restore/backup the security system to an encrypted file To enable remote access, there will be one or more routers, firewalls, and VPN devices that need to be configured. In large corporations, the IT department will have the necessary expertise and in most cases they will be responsible for securing all networks in the company. Typically, factory floor networks are isolated from the plant network through a local router/firewall and you or your IT department will need to configure that local router to protect against other potential threat vectors as shown back in Figure 2. The following is a list of recommended steps to take to configure your network and application to promote secure remote access to your plant floor devices. Router/firewall setup Most routers have similar mechanisms for setting up security features. You should refer to your router’s documentation for user interface details. 1. Internet port routing/forwarding—In Figure 5 we see a typical table for setting up a routing table for Internet or upstream WAN ports. You can set up incoming traffic on the WAN port to be directed to a specific computer name or IP address. You can also set up which protocols (TCP, UDP, Both, or other) you pass, when to forward them (Always, Never, or Specific Schedule), and whether to filter inbound sources (Allow All, Deny All, or Specific Filters) based on host name or IP address. EATON www.eaton.com 9 White Paper WP048001EN Effective September 2016 Cybersecurity concerns? Secure remote access with your operator interface Figure 5. It is recommended that you use this table to allow only those specific ports needed by the application and only to those specific host PCs to which you trust access; then, close all other ports with Deny All. 10 EATON www.eaton.com 2. MAC address filtering—In Figure 6 we see a typical table for filtering which specific MAC (Media Access Control) addresses are either allowed or denied access to this local network. There are two ways to do this: a “White List” of only those you wish to allow; or, a “Black List” of those PCs that are not allowed. In most cases, a white list approach is the best choice because it requires the least amount of maintenance. Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 Figure 6. It is recommended that you use this to only allow specific user’s PC, PLCs, and HMIs to be connected to this local network. This will give you the ability to allow only trusted PCs on the network. This is especially true if the router also allows wireless connections, because many wireless devices, cell phones, tablets, etc. are not necessarily secure. Depending on the router, there will be many other ways of locking out specific Internet websites and hosts, creating inbound filters and rules, and for creating custom routing tables. By taking the first two steps, you can generally achieve a secure network. The following are some additional recommendations from the U.S. Department of Homeland Security on Small Office/Home Office Router Security: • Change the default login user name and password— Manufacturers set default user names and passwords for these devices at the factory to provide users access to configure the device. These default user names and passwords are readily available in different publications and are well known to attackers; therefore, they should be immediately changed during the initial router installation. A strong password that uses a combination of letters and numbers with 14 characters or more is recommended. Furthermore, change passwords every 30 to 90 days. • Disconnect the network when not in use—Disconnecting the network uplink/WAN port, creating what is called an air gap, will most certainly prevent outside attackers from breaking in. While it may be impractical to connect and disconnect the uplink frequently, consider this approach when someone will be in the plant to turn on or connect the router when remote diagnostics are necessary. • Disable or monitor wireless access—If wireless access to the router is not required, disable this feature. If it is required, then regularly monitor the wireless traffic to identify any unauthorized use of the network. If an unknown device is identified, then a firewall or MAC filtering rule can be applied to the router. • Logging—Enable router logging and periodically review the logs for important information regarding intrusions, probes, attacks, etc. • Disable UPnP—Universal Plug and Play (UPnP) is a handy feature allowing networked devices to seamlessly discover and establish communication with each other on the network. Though the UPnP feature eases initial network configuration, it is also a security hazard. For example, malware within your network could use UPnP to open a hole in your router firewall to let intruders in; therefore, disable UPnP when not needed. EATON www.eaton.com 11 White Paper WP048001EN Effective September 2016 • • Upgrade firmware—Just like software on your computers, the router firmware (the software that operates it) must have current updates and patches. Many of the updates address security vulnerabilities that could affect the network. Use static IP addresses or limit DHCP reserved addresses— Most routers are configured as Dynamic Host Configuration Protocol (DHCP) servers. DHCP makes configuration of client devices easy by automatically configuring their network settings (IP address, gateway address, DNS info, etc.). However, this also allows unauthorized users to obtain an IP address on your network. Disabling DHCP and configuring clients manually is the most secure option, but it may be impractical depending on the size of your network and support staff. If using DHCP, limit the number of IP addresses in the DHCP pool. It may limit the number of users, potentially including unauthorized users that can connect to your network. • Disable remote management—Disable this to keep intruders from establishing a connection with the router and its configuration through the wide area network (WAN) interface. For applications where plant or corporate IT is managing your plant floor router, this does not apply. • Disable remote upgrade—This feature, if available, allows the router to listen on the WAN interface for TFTP traffic that could potentially compromise the router firmware. Therefore, it should be disabled. For applications where plant or corporate IT is managing your plant floor router, this does not apply. • Disable DMZ—The router’s demilitarized zone (DMZ) creates a segregated network exposed to the Internet, used for hosts that require Internet access (Web servers, etc.). Disable this feature if not needed. Users or administrators sometimes enable it for troubleshooting reasons and then forget to deactivate it, exposing any system inadvertently placed there. • Disable ping response—The ping response setting is usually disabled by default. With this feature enabled, reconnaissance on the router becomes easier than when it is disabled. It allows your router to respond to ping commands issued from the Internet, and it potentially exposes your network to intruders. Although disabling this feature will not shield you from discovery, it will at least increase the difficulty of discovery. Verify that the service is disabled. How to secure the device There are a number of steps to be taken to secure the XP and XV units from malware. These can be broken down into four sections: physical security, password management, firewall setting, and system backups. 12 EATON www.eaton.com Cybersecurity concerns? Secure remote access with your operator interface Physical security setup While this paper focuses on network threat vectors, it is always good to first ensure physical security. Locked cabinets and wellcommunicated security policies will keep users from plugging in USB devices that could pose a security threat. You should also disable the USB and CD/DVD auto-play feature if you have such ports/drives in a network HMI system. It is also recommended that the local control network have its own secure router/firewall with an uplink to the plant network. That uplink could then be physically disconnected when the corporate firewall has been breached and the corporate network compromised. This will create a temporary air gap that will disable remote functions while allowing the local control network and process to stay running. On an XP-503, you can take the extra step of utilizing the two available Ethernet ports to separate the control and plant network from an external network for remote assistance from outside the corporate VPN and firewall. This other network can be disconnected normally and connected only when you want accessibility from OEMs, Sis, or other support personnel that are outside the corporation. You can also keep this second network locked from remote user access and use tools like Cisco’s WebEx or AT&T’s Web Meeting services to initiate a secure Web meeting and invite support personnel to the meeting to view or take remote control for troubleshooting purposes. Password management Designated individuals should administer all application password accounts, and passwords should be guarded against sharing or theft. Sticky-notes stuck to computer screens are not a good place to keep passwords, but it’s also not necessarily a good idea to password protect every screen or input unless for regulatory purposes. Be judicious about where you use passwords and make sure there are good reasons for protecting certain operator interface functions. Furthermore, it is recommended that strong passwords be required and that password aging, auto log off, and account lockout are enabled so as to ensure a secure operator interface application. Visual Designer applications automatically support these features. Remote Access features like Remote Desktop Server, FTP Server, and Remote Agent all have passwords disabled by default. You should enable passwords and use strong passwords to prevent unwanted access to these services. Because these services do not support password aging, you should schedule changing them every several months. Firewall setting As shipped, the XP-503 has the Windows Firewall enabled but with exceptions configured, which allow certain remote functions through the firewall. Also, if you install third-party software such as RealVNC or UltraVNC, they will create additional firewall exceptions to allow them to function. Figure 7 shows a complete exception list for an XP-503 running Visual Designer with UltraVNC installed. Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 Figure 7. If you wish to remove some of these exceptions because you don’t plan to use some remote features, they can be unchecked from the Exceptions list to close the port or service; or, if you want to block all exceptions, you can go to the General tab and check the checkbox labeled “Don’t Allow Exceptions.” You should be aware that blocking services such as IIS will disable any Web serving; and, blocking Remote Agent will disable remote changes to the project. You can also choose to open and close these features as needed, which will prevent malware from having full access to these vulnerabilities all the time. If you want to see which ports and services are open, you can download an open source tool such as Nmap that will scan the remote device and report on all open and closed ports. Figure 8 shows a sample output from NMAP connected to an XP-503 with all exceptions checked. EATON www.eaton.com 13 White Paper WP048001EN Effective September 2016 Figure 8. 14 EATON www.eaton.com Cybersecurity concerns? Secure remote access with your operator interface Cybersecurity concerns? Secure remote access with your operator interface White Paper WP048001EN Effective September 2016 In Figure 9, we see the results from disabling all selections in the firewall, which closes all ports to completely secure the unit from remote access. Figure 9. An XV-102 or 152 unit runs a Windows CE 5.0 Professional operating system and does not have a built-in firewall. As shipped from the factory, when the XV unit starts up, the Autoexec.bat file starts the FTP Server, Remote Desktop server, VNC Gateway server, Web server and the Visual Designer Remote Agent. All these remote features have separate passwords that are blank from the factory, but can be configured easily on the unit. It is recommended that these services are either prevented from starting by editing the Autoexec.bat file, or that strong passwords be created for each service. If these services are disabled in the Autoexec.bat file, then all their associated ports are unavailable remotely and the unit is secure from remote access. System backups You should assume that every HMI/SCADA system and PLC will fail at some point in time. Assume that either a hardware failure or, despite all your best efforts, a security breach will bring the system down and halt production. Not all applications will warrant a hot standby or even a spare for each critical piece of equipment. For these cases it is recommended that your PC-based systems have a protected operating system, like the Eaton XP and XV operator interface models, so that you can recover from all but catastrophic hardware failures with a simple reboot. If you don’t have an HMI/ SCADA with a protected OS, then you should make sure you minimize the most common hardware failure by insisting on all solidstate memory; keeping antivirus definitions and Windows security patches up to date; and, performing periodic backups using Ghost, Power Quest, or other backup utility. EATON www.eaton.com 15 White Paper WP048001EN Cybersecurity concerns? Secure remote access with your operator interface Effective September 2016 Conclusion About the author Remote access is now a necessary and largely beneficial feature of the IT environment. Although cybersecurity risks continue to evolve and persist, careful attention to the proper selection, use, and configuration of security capabilities within the operator interface and control environment can effectively help guard against potential losses from attack, interruption, or downtime. Remember, the most reliable and readily available defenses against any security attack are always awareness, forethought, and due diligence. Eaton’s XP and XV Operator Interface Stations with Visual Designer come ready and equipped with a thoughtful range of flexible and easy-to-configure options capable of meeting both the ordinary and extraordinary requirements of any automation scenario. By breaking the remote access security needs down into smaller, more manageable zones and simply addressing both the recommendations and exceptions of each area—platform, software, network, and device—the vast majority of threats from common security vectors can be significantly minimized and avoided. Kerry Sparks Kerry Sparks has worked in the process control and automation industry for over 40 years and has focused on PLC, HMI, and SCADA. He is currently Product Manager for Eaton’s automation product solutions. Additional Help In the event additional help is needed: In the United States or Canada, please contact the Technical Resource Center at 1-877-ETN-CARE or 1-877-326-2273. Location Contact United States and Canada Europe Technical Resource Center at 1-877-ETN-CARE or 1-877-326-2273 or email at: [email protected] European Technical Support at +49/228/602-1001 or email at: [email protected] About Eaton Eaton’s electrical business is a global leader with expertise in power distribution and circuit protection; backup power protection; control and automation; lighting and security; structural solutions and wiring devices; solutions for harsh and hazardous environments; and engineering services. Eaton is positioned through its global solutions to answer today’s most critical electrical power management challenges. Eaton is a power management company with 2015 sales of $20.9 billion. Eaton provides energy-efficient solutions that help our customers effectively manage electrical, hydraulic and mechanical power more efficiently, safely and sustainably. Eaton has approximately 96,000 employees and sells products to customers in more than 175 countries. For more information, visit www.eaton.com. Eaton 1000 Eaton Boulevard Cleveland, OH 44122 United States Eaton.com © 2016 Eaton All Rights Reserved Printed in USA Publication No. WP048001EN / Z18627 September 2016 Eaton is a registered trademark. All other trademarks are property of their respective owners.
© Copyright 2026 Paperzz