Saes Z 010
Saes Z 010
Contents
1 Scope ................................................................ 2
2 Conflicts and Deviations ................................... 4
3 References........................................................ 4
4 Definitions ......................................................... 5
5 Process Automation Network Design ................ 8
6 Wiring System ................................................. 12
7 Access Control Management
and Monitoring Design Requirements ............. 12
8 Operating System and
Network Device Hardening ............................. 15
9 Centralized Patch Server ................................ 15
10 Backup and Recovery ..................................... 15
11 System Testing ............................................... 15
12 Documentation ................................................ 16
Revision Summary ................................................. 16
1 Scope
1.1 This standard establishes the requirements for design, installation, configuration
and commissioning of Process Automation Networks (PANs), which shall
interface with plant DMZ (Demilitarized Zone) to communicate with the Saudi
Aramco corporate network or third party external networks. Process
Automation Network is a plant-wide network interconnecting Process Control
Systems (PCS) that provides an interface to the corporate network through plant
DMZ. A PAN does not include proprietary process control networks provided
as part of a vendor's standard process control system.
Parties involved in the commissioning of PANs are required to comply with this
standard.
1.2.2 The requirements and guidelines governing the engineering, design and
installation of Supervisory Control and Data Acquisition (SCADA) is
covered in SAES-Z-004.
1.3 This entire standard may be attached to and made a part of purchase orders.
Any conflicts between this document and other applicable Mandatory Saudi Aramco
Engineering Requirements (MSAERs) shall be addressed to the EK&RD Coordinator.
Any deviation from the requirements herein shall follow internal company procedure
SAEP-302.
3 References
The selection of material and equipment and the design, construction, maintenance, and
repair of equipment and facilities covered by this standard shall comply with the latest
edition of the references listed below.
Systems
23-SAMSS-030 Remote Terminal Unit
23-SAMSS-050 Terminal Management Systems
23-SAMSS-701 Industrial Ethernet Switch Specifications
23-SAMSS-072 Data Acquisition and Historization System (DAHS)
34-SAMSS-820 Instrument Control Cabinets - Indoor
Corporate Policy
INT-7 Data Protection and Retention
4 Definitions
Firewall: A set of related programs, located at a network gateway server that protects
the resources of a private network from users of other networks.
Human Machine Interface (HMI): The display, data entry devices and supporting
software to allow a user access to applications.
Interfaces: Software modules for collecting data from data sources or sending data to
other systems. Typical data sources are Distributed Control Systems (DCSs),
Programmable Logic Controllers (PLCs), OPC Servers, lab systems, and process
models. However, the data source could be as simple as a text file.
L3 Switch: A network device that joins multiple computers together at the network
protocol layer of the Open System Interconnection (OSI) model eliminating the need for
a router. L2 network switches operate at layer two (data link layer) of the OSI model.
Local Area Network (LAN): A private data communications network, used for
transferring data among computers and peripherals devices; a data communications
network consisting of host computers or other equipment interconnected to terminal
devices, such as personal computers, often via twisted pair or coaxial cable.
Logical Separation: The use of different Layer 3 network subnets or software running
on common hardware to separate two or more networks and systems.
Logs: Files or prints of information in chronological order.
OPC: OPC (originated from OLE for Process Control, now referred as open
connectivity via open standards) is a standard established by the OPC Foundation task
force to allow applications to access process data from the plant floor in a consistent
manner. Vendors of process devices provide OPC servers, whose communications
interfaces comply with the specifications laid out by the task force (the OPC standard),
and any client software that complies with that standard can communicate with any of
those servers without regard to hardware releases or upgrades. The connection between
the client and the OPC server is either through the Microsoft COM interface or through
OLE automation, and the client accesses data from the data cache maintained by the
OPC server or requests that the server read the device directly.
Physical Separation: The use of different hardware to separate two or more networks
and systems.
Plant Historian: A plant-wide data repository which collects, archives, and
disseminates real-time plant information at extremely high speeds. It can be
cost-efficiently scaled to meet the demands of small, medium and large plants equally.
It can read all types of process data, and is the ideal solution to have all key parameters
of all types of manufacturing operations.
Abbreviations:
CCTV Closed Circuit Television
CSMA/CD Carrier Sense Multiple Access/Collision Detection
DAHS Data Acquisition and Historization System
DCS Distributed Control Systems
DHCP Dynamic Host Configuration Protocol
DMZ Demilitarized Zone
DNS Domain Name System
FTP File Transfer Protocol
IP Information Protocol
LAN Local Area Network
OSI Open Systems Interconnection
PAN Process Automation Network
SCADA Supervisory Control and Data Acquisition
SIEM Security Information and Event Management
SOC Security Operation Center
TCP Transmission Control Protocol
5.1 The PAN shall be based on IEEE 802.3 CSMA/CD (Ethernet) standard.
The backbone shall be based on Layer 3 multi-protocol switches or routers.
5.2.1 The network design shall provide physical and logical separation
between PAN and all other networks such as the Saudi Aramco
Corporate Network using SAES-T-566 Plant Demilitarized Zone (DMZ)
Architecture.
5.3 PAN can be used to integrate auxiliary systems on a single network such as
emergency shutdown systems, compressor control systems, vibration monitoring
systems, etc., for the purpose of centralizing the engineering and maintenance
activities of the plant.
5.6 All TCP/IP addressing shall be obtained from Saudi Aramco IT Organization.
5.8 Dynamic Host Configuration Protocol (DHCP) shall not be used on the PAN.
6 Wiring System
6.3 Fiber optic cable routed to another cabinet shall be run in polyethylene
corrugated loom tubing or flexible conduit at a minimum.
6.4 Corrugated loom tubing or flexible conduit is not required inside cabinets.
6.5 PAN cabling shall conform to the data link requirements in SAES-J-902.
7.1.4 The system shall be configured to require passwords to be reset for all
user IDs every three months.
7.1.5 The system should issue a password expiration notification to the user at
least 10 days prior to password expiry date.
7.1.7 In order to change user account passwords, users should always be required
to provide both their old and new passwords.
7.1.8 PAN router and switch passwords shall be changed prior to commissioning.
7.1.9 PAN routers and switches should monitor and record all failed login
attempts.
7.2.2 Repeated login failures shall be logged with the location, date, time, and
user account used.
7.2.3 At login time, every user should be given information reflecting the last
login time and date, if supported by the system or application. This will
allow unauthorized system usage to be detected.
7.3 Disposing of PAN equipment that contains data storage shall be sanitized in
compliance with GI-0299.120.
7.4.1 The PAN shall be configured for the monitoring and recording of:
i. System Events
ii. Security Events (i.e. logon events, privileged activities, user ID, user
type, transaction and log source, etc.)
7.4.2 The PAN shall include a system to proactively monitor Plan Networks
and Systems components in accordance with vendor recommendations:
7.4.4 The PAN shall facilitate an automated (SIEM) solution that securely
integrates with Saudi Aramco corporate SOC.
7.5.1 The PAN hardware components such as cables, switches, routers, and
Saudi Aramco: Company General Use
Page 14 of 16
Document Responsibility: Plants Networks Standards Committee SAES-Z-010
Issue Date: 1 January 2018
Next Planned Update: 29 October 2018 Process Automation Networks
8.1 PAN equipment shall be deployed with vendor latest supported security
hardened operating system.
8.2 The secure configuration baselines shall be thoroughly tested by the vendor.
The vendor shall enable the PAN administrators to support and administrate the
PAN equipment after deployment and commissioning.
8.3 PAN equipment with unused physical ports/interfaces shall be disabled before
commissioning.
A centralized patch server shall be located on the PAN or DMZ to distribute operating
systems’ security patches, antivirus updates, and vendor application software to stations
located on PAN or DMZ. This centralized server shall be used for stations connected to
the PAN, which are part of other systems such as PCS or emergency shutdown systems.
A complete backup of PAN switches, routers, and PAN systems configuration shall be
developed for new installations or upgrades of PAN equipment. This includes:
10.4 One copy shall be stored in a secure onsite location and the other copy shall be
maintained at a secure off-site location
11 System Testing
11.1 Testing shall address all plant components, networking and interfaces to external
systems and to legacy applications/system. Formal testing shall minimally
comprise Factory Acceptance Test (FAT) per SAEP-1634, Site Acceptance
Tests (SAT) per SAEP-1638, Performance Acceptance Tests (PAT), and
11.2 Comprehensive test plans and test specifications such as SAEP-701, Plant Ethernet
Network Test Procedure, shall be followed for all plant platforms, networking,
applications, integration components, interfaces to external systems and legacy
applications/systems, and any additional technology content of the project.
12 Documentation
Comprehensive documentation shall be provided to ensure that the PAN is installed and
configured in a consistent manner. It shall include detailed layouts of TCP/IP addressing
schemes and all other network protocols used in the system. The documentation shall
also include physical locations of systems components like routers, and switches.
The following shall be made available:
12.1 Standard vendor manuals and catalogs shall be provided in CD-ROM or other
electronic media. Formats should be in PDF or HTML.
12.3 Final project specific documents in two signed hard copies plus two sets of
CD-ROM in Microsoft Word.
12.4 A plant network drawing layout showing the PAN logical and physical design
and its interconnection to the Corporate Network.
12.6 All PAN software shall be authentic, supported, and up to date with security
patches, fixes or other revisions. Software licenses, activation keys and, where
available, offline backup media shall be provided as part of the equipment
documentation.
Revision Summary
29 October 2015 Major revision to reflect Audit IS2015-426 observations and addressed Plant Networks
segmentation requirements.
1 January 2018 Editorial revision to modify and/or delete paragraph 7.3.