En Cybersecurity Guide C A4-1
En Cybersecurity Guide C A4-1
Table of contents
Table of Contents
White Paper....................................................................................................................................................................3
Appendices ................................................................................................................................................................... 40
Glossary .................................................................................................................................................................................. 40
List of references ..................................................................................................................................................................... 43
Further information ................................................................................................................................................................ 44
Product and service inquiries ............................................................................................................................................ 44
Product training................................................................................................................................................................. 44
Providing feedback on ABB manuals................................................................................................................................. 44
Document library on the Internet ..................................................................................................................................... 44
Contact us................................................................................................................................................................................ 45
6 Cyber security essentials
Cyber security essentials 7
1
Introduction to the guide
Disclaimer
This document is not intended to be used verbatim, but rather as an
informative aid. The examples in this guide are for general use only and do not
offer all the necessary details for implementing a secure system.
It is the sole responsibility of the customer to provide and continuously ensure
a secure connection between the product and the customer network or any
other network. The customer is required to establish and maintain any
appropriate measures (including but not limited to the installation of firewalls,
application of authentication measures, encryption of data, installation of anti-
virus programs, etc.) to protect the product, the network, its system, and the
8 Cyber security essentials
2
Cyber security essentials
Introduction
Traditionally, “cyber security” has been defined to mean all measures taken to
protect computer systems and networks against unauthorized access or attack.
In the context of power and automation technology, the definition has been
redefined to mean measures taken to protect the reliability, integrity and
availability of power and automation technologies against attack that may
result in unauthorized information disclosure, damage to hardware, software,
data, as well as in the disruption of operation.
IT Cyber security covers all the processes and mechanisms by which digital
equipment, information and services are protected from unintended or
unauthorized access, change or destruction, as well as security measures to
ensure the confidentiality, integrity and availability (CIA) of data, both in transit
and at rest. In the OT world, the idea is more like preserving the same “CIA”
properties but in reversed order: “AIC”. That is because the availability of
operation or even safety is considered more crucial than confidentiality
compared to the IT world.
10 Cyber security essentials
Cyber security is of key importance for ABB customers and ABB alike. There
are several reasons for that, such as the following:
• Modern automation, protection, and control systems are often highly
specialized IT systems leveraging commercial, off-the-shelf IT
components and using standardized, IP-based communication protocols.
• The control systems can be also distributed and interconnected, which
means an increased attack surface compared to legacy and isolated
systems.
• The control systems are extensively based on software.
• DoS (denial-of-service) attacks and malware (e.g., worms and viruses)
have become all too common and have already impacted ICS (industrial
control systems).
• Computer systems include a very wide variety of smart devices,
including smartphones, and networks include not only the Internet and
private data networks, but also Bluetooth, Wi-Fi, and other wireless
networks.
• Cyber security of industrial control systems typically includes three
threat categories:
o Hacking. An attacker specifically targets an industrial control
system to, for example, blackmail a site owner or damage the
reputation of an automation vendor. This could be achieved by
creating dedicated malware. Stuxnet is most likely an example
of such a targeted attack.
o General malicious software. Consider a scenario where an
employee connects a laptop to the system network or inserts a
USB stick into a server. The purpose of these actions could very
well be benign, but if the laptop or USB stick is infected with
malware, there is a significant risk that the automation system
could be infected as well. Even though the malware in these
cases hasn’t been designed to damage automation systems, it
can still be very harmful.
o Employee mistakes. For example, an engineer wants to update
the control logic in an embedded device, but by mistake
connects the engineering tool to the wrong device, or an
engineer connects a network cable to the wrong port of a
network switch.
• Most often, hacking is what people think of when discussing cyber
security. However, these types of attacks only constitute a minority of
all incidents. General malicious software and employee mistakes
make up most incidents.
There is significant overlap among many of the standards, especially those which
are useful for operators or site owners.
The main reference for automation cyber security requirements is documented in
standard IEC 62443 (also known as ISA 99) with the widest scope and most
detailed guidelines [5]. The NIST Cyber security Framework version 1.0 was
published on February 1, 2014 and has less details. Version 1.1 was updated in
April 2018 with clarifications and new version 2.0 is under work at the time of
publishing this document. NERC CIP is worth mentioning, since at sites that are
connected to the bulk electric grid in the US and Canada, it is mandatory to
comply with the NERC CIP standard.
The International Electrotechnical Commission (IEC) is a worldwide organization
for standardization that continuously develops and maintains all parts of the IEC
62443 series, published under the general title Industrial communication
networks – Network and system security. These standards can be purchased from
the IEC website. The IEC 62443 series standards with titles are listed in Table 1.
The derivation of cyber security requirements from the aforementioned standards for
a specific automation case is not a trivial task. Providing that the necessary safety and
operation continuity requirements can be met, the cyber security requirements can
be analyzed using the installation environment, use cases and threat landscape as a
basis for understanding the cyber security threats.
14 Cyber security essentials
As presented in the above table, IEC 62443 series is organized into four parts
presenting security requirements for different levels of industrial automation and
control system context. In the next section, the concept of defense in depth is
presented which follows similar idea of organizing security measures into different
layers. The four different IEC 62443 standard parts also apply differently to different
roles related to industrial automation and control systems. These roles are referred in
the following section.
Defense in depth
There is no single solution to managing the cyber security risk in an industrial
control system, nor is there a completely secure system. Hence, like many other
instances, ABB recommends “defense in depth,” which means the coordinated
use of multiple security countermeasures and addressing people, technology,
and operations in several layers.
Defense in depth is an information assurance concept in which multiple layers of
security controls (defenses) are placed throughout an information technology (IT)
system. Its intent is to provide redundancy in the event a security control fails, or a
vulnerability is exploited.
Cyber security essentials 15
It is essential to make sure that controls build depth as opposed to just breadth.
The perspective should not be limited to the physical realm, thinking in terms
of only physical network and system boundaries. To verify that the defense is
genuinely defense in depth, it should be possible to take a given threat and a
given asset and find more than one control that protects that asset from the
selected risk.
DL 1.3 DL 1.3.1 Communicate to all users and train them in the Unintended
Providing Following the established cyber security and change consequences
product user recommendations management procedures. caused by
documentation provided trusted actors
on how to
securely
operate the
product
DL 1.4 DL 1.4.1 Disable the SSH service (factory support Enlarged attack
Providing Following the account) when SSH console for support and surfaces
product user recommendations diagnostics is not needed.
documentation provided
on how to
harden the
product Use HTTPS instead of HTTP where applicable.
DL 2 Account DL 2.1 DL 2.1.1 Create only those accounts that will be Enlarged attack
management Providing product user Following the used locally or remotely, using roles surfaces
documentation on recommendations with as few access rights as possible. Unauthorized
requirements and provided Use strong passwords. access to system
recommendations on
how to manage the user Remove default accounts.
accounts associated
If ABB cloud services are used (for
with the product
example, ABB AbilityTM Digital
Powertrain - Condition Monitoring for
drives): Regularly verify the given e-
mail accesses for the CIAM accounts
to avoid misuse, and communicate
wrong or expired accounts
immediately to ABB.
Monitoring for the use of monitoring systems unauthorized access or other suspect connecting to
and monitoring and and ensure that these behavior. trusted networks
detection detection systems cannot negatively Undiscovered
relevant to the affect the system Monitor the cyber security, topology devices
product. operation under any (asset management) and correct
circumstances. operation of the plant networks using
the cyber security monitoring
modules and features of the firewalls
and managed switches
Cyber security must be considered in all phases. The table below lists typical cyber
security considerations in different project phases. The activities are partially the
same as in the table presented in section Defense in depth - generic cyber
security policies and controls. The activities are also referenced with
corresponding IDs.
Enable remote access only for authorized vendor personnel with authorized user
accounts. DL 2.1.1
Restrict (each user account) access from different vendors to subnetworks or machines
belonging to the delivery. DL 2.1.1
Install trusted signed SW packages only from trusted sources (e.g., from ABB Drives site
with HTTPS). DL 3.1.1
Test that all systems and cyber security mechanisms work according to the
specifications.
Communicate to all users and train them in the established cyber security and change
management procedures. DL 1.3.1
Establish network cyber security monitoring systems and ensure that these cannot
negatively affect the system operation under any circumstances. See DL 7.1.1.
Maintenance Keep up the hardening by strict access and change control, allowing only planned
changes and patches to systems including ABB products, network devices and operating
systems. DL 1.4.1, DL 5.1.1, DL 6.1.1
3
Example cases
Introduction
The goal of “secure by deployment” is to ensure that products can be installed,
configured, operated, and maintained in a secure way. This includes deployed
software remaining free from known vulnerabilities or security weaknesses.
As is shown in each case, ABB Drives products enable remote networked
operation and monitoring. These networking and connectivity capabilities
increase the importance of hindering all unauthorized electronic access to
automation systems.
26 Example cases
1
Firmware integrity can be verified by using SHA checksum from released upgrade package from sales release note of
corresponding firmware release from ABB library (or other trusted source)
• configuration settings available through control panel such as
time/date formats and enabling/disabling clock display.
Normal hardening instructions for IoT gateway apply also in the context of cloud services. It is
also possible to close the entire web interface of IoT gateway over the cloud connection (for
example, if IoT gateway is connected to a public network).
Description
This example describes generic means to monitor, operate and maintain remote pump
stations (booster pump application) in real time using permanent wireless connections. In
addition to an industrial automation plant example, it also illustrates the possibility that
drives can be connected to the Drivetune mobile app via a Bluetooth interface (ACS-AP- W)
and the mobile app operating as a gateway can connect drives to the Internet via mobile
(3G/4G) networks. In this example, ABB’s ACS580 general purpose drives are used to
represent variable speed drives.
FPNO-21
P i t ti 1
Mobile app for wireless access, assistant control panel and Bluetooth connection
deployment:
• Disable the Bluetooth connection when it is not needed. At the very minimum, disable at least
the always discoverable mode that keeps the ACS-AP-W assistant control panel discoverable to
any Bluetooth device within wireless range.
• If the always discoverable mode is needed, make sure the PIN code used for pairing process is
kept in a secure place and only authorized persons have access to it.
Description
This example case is like the industrial automation case, the difference and specific addition
being the OEM vendor’s remote service connection. OEM manufacturers are often
willing to monitor and offer remote support for their machinery and for ABB variable speed
drives inside that machinery. This remote connection is typically implemented via a third-
party VPN connection (including hardware devices and software). In this example, ABB’s
ACS380 and ACS880-M04 machinery drives are used to represent variable speed drives.
32 ABB cyber security policies
Local PC
Automation Builder and
Trusted Network Drive manager
Untrusted Network
Machinery- level Case 2: Direct OEM vendor Machinery OEM Automation Builder
network access case condition monitoring and Drive manager
(PROFINET, HTTPS) service
Case 1: OEM access via the customer’s network, firewalls, and access point:
• Deploy and securely manage the firewalls in the front of the plant-level network.
• Connect the corporate firewall to the OEM vendor firewall using static secure VPN gateway-
to-gateway connections.
• Deny by default all connections from the machinery networks to other networks.
• Allow only authenticated and secured (HTTPS) service connections between OEM machinery
and OEM machinery remote tools.
• Deploy the dedicated managed switch(es) for the use of plant-level networks.
• Separate the different field networks into different segments and deny all unnecessary data
communication between the segments.
• Learn and use the cyber security features of the managed switch so that all unnecessary
activity is blocked in the subnetworks.
• Separate the management systems and connections to separate network segments with all
necessary cyber security features on.
• Deny all other connectivity mechanisms from the machine-level systems to restrict
unauthorized access as much as possible.
• Monitor the cyber security, topology (asset management) and correct operation of the plant
networks using the cyber security monitoring modules and features of the firewalls and
managed switches.
• Allocate a dedicated cellular operator access point (APN) for a machine OEM vendor to
access.
• The allocated wireless router should only establish and accept connections via a trusted
cellular operator access point with customer-agreed cyber security features.
• Allocate firewall solutions to the front of the OEM machine. Carefully manage the firewall, its
configuration and access rules.
• Carefully disable all unused services from all components to reduce the attack surface.
• Actively monitor the internal network nodes and behavior of machines using cyber security
monitoring services. Specifically track for any misconfigured devices and possible malware
behavior patterns.
In both cases, the deployment of ABB drive and connectivity products follows the principles
shown in the industrial plant example.
Machinery drive deployment:
See section Cyber security risk mitigation and secure deployment on page 28 for deployment
instructions. Follow the same procedures. [12]
Description
This example describes generic means for remote monitoring of geographically distributed
buildings and has similarities with the remote pumping station example. The main purpose is
to monitor, control and update in real time several buildings and building systems from a
control room. In this example case, ABB’s ACH550 and ACH580 HVAC (heating, ventilation,
and air conditioning) segment-specific drives are used to represent variable speed drives in
general.
The other related ABB Drives connectivity products together with ACH550 and ACH580 drives
shown are:
• A BACnet/IP adapter module (e.g., FBIP-21) is an optional device for ABB drives, e.g., the
ACH580, enabling the connection of the drive to a BACnet/IP network.
• A BACnet/IP router module is (e.g., RBIP-01) is a BACnet router. It is a snap-on module, fitted
inside the drive and fully compatible with all ABB ACH550 standard drives for HVAC.
34 ABB cyber security policies
network
Untrusted Network
Field level
Automation level
RBIP-01
BACnet MS/TP
FBIP-21
Building
Management
System (BMS)
Management level
4
ABB cyber security policies
Principle
ABB takes all cyber security-related concerns seriously and has been
relentlessly following programs aimed at developing and improving product
features and processes, which, in close co-operation with ABB’s vendors and
customers, help in selecting, deploying, and maintaining the cyber security of
applied technical solutions without substantially sacrificing functional safety or
operational performance or productivity.
ABB products are aimed at reducing business risk, providing comfort and
confidence, as well as enabling compliance with standards and legal
requirements. ABB also emphasizes that the cyber security is not a destination,
but an evolving target requiring well-established processes to be in place.
ABB is committed to providing its customers with products, systems and
services that clearly address cyber security. Proper and timely handling of cyber
security incidents and software vulnerabilities is one important factor in
helping customers minimize risks associated with cyber security. ABB has
therefore established a formal vulnerability handling policy which will be
applied at least in the following events:
• An external party (e.g. customer, researcher, government organization)
approaching ABB reporting a potential vulnerability affecting an ABB
product
• A vulnerability disclosed publicly affecting an ABB product
• A vulnerability being discovered internally that impacts the installed
base
• Malware targeting ABB products
Suppliers for ABB have a crucial role in the cyber security program. It is therefore expected
that suppliers support and complement ABB’s efforts to keep the systems secure. The ABB
Cyber Security Requirements for Suppliers establish the minimum measures that we
expect our suppliers to comply with. The measures shall be fulfilled for any software-
related product that is supplied to ABB.
38 ABB cyber security policies
Term or Explanation
abbreviation
2G, 3G, 4G, 5G The second, third, fourth and fifth generations of mobile telecommunications
technology
APN Access point name is the name of a gateway between a GSM, GPRS, 3G, 4G or 5G
mobile network and other networks
Authenticate Verify the identity of a user, user device or other entity, or the integrity of data
stored, transmitted, or otherwise exposed to unauthorized modification in an
information system, or to establish the validity of a transmission
Authorization Right or permission that is granted to a system entity to access a system resource
Change Process of controlling and documenting any change in a system to maintain the
management proper operation of the equipment under control
Firewall A network security system that monitors and controls the incoming and outgoing
network traffic based on predetermined security rules
GPRS General packet radio service is a packet-oriented mobile data service on the 2G
and 3G cellular communication system’s global system for mobile communications
(GSM)
GSM Global system for mobile communications, the 2nd generation (2G) of mobile
telecommunications technology
HTTPS Also called HTTP over TLS, HTTP over SSL, and HTTP Secure, is a protocol for
secure communication over a computer network that is widely used on the
Internet
Incident Event that is not part of the expected operation of a system or service that causes
or may cause, an interruption to, or a reduction in, the quality of the service
provided by the system
Integrity Quality of a system reflecting the logical correctness and reliability of the
operating system, the logical completeness of the hardware and software
implementing the protection mechanisms, and the consistency of the data
structures and occurrence of the stored data
IP (Internet Network layer communications protocol in the Internet protocol suite for
Protocol) relaying datagrams across network boundaries
NBT NS NBT NS is a daemon for the NetBIOS name discovery. Allows finding computers
from a local network by using the NetBIOS host name
NTP Network time protocol is a protocol for synchronizing computer clocks over a
network.
OEM Original equipment manufacturer is a term used when one company makes a part
or subsystem that is used in another company’s end product
Patch Area of systems management that involves acquiring, testing, and installing
management multiple patches (code changes) to an administered computer system
SSH Secure shell is a cryptographic (encrypted) network protocol to allow remote login
and other network services to operate securely over an unsecured network
TLS Transport Layer Security and its predecessor SSL are cryptographic protocols
designed to provide communications security over a computer network (privacy
and data integrity between two communicating computer applications)
VLAN Virtual local area network. Any broadcast domain that is partitioned and isolated
in a computer network at the data link layer
List of references
You can find manuals and other product documents in PDF format on the Internet. See section Document
library on the Internet on the inside of the back cover. For manuals not available in the Document library,
contact your local ABB representative.
Further information
Product and service inquiries
To report a suspected problem or to get the latest information about cyber
security, please visit the ABB Cyber security Portal or send an email:
Web: https://global.abb/group/en/technology/cyber-security
Email: cyber [email protected]
Publicly disclosed vulnerability public responses can be found from ICS-CERT -
https://ics-cert.us-cert.gov/alerts.
Product training
For information on ABB product training, navigate to
https://new.abb.com/service/training.