DOCA0131EN-03

Cyber Security

Introduction

Cyber Security is a branch of network administration that addresses attacks on or by computer systems and through computer networks that can result in accidental or intentional disruptions.

The objective of Cyber Security is to help provide increased levels of protection for information and physical assets from theft, corruption, misuse, or accidents while maintaining access for their intended users.

No single Cyber Security approach is adequate. Schneider Electric recommends a defense-in-depth approach. Conceived by the National Security Agency (NSA), this approach layers the network with security features, appliances, and processes.

The basic components of Schneider Electric’s defense-in-depth approach are:

  1. Risk assessment. A systematic security analysis of the deployment environment and related systems.

  2. A security plan built on the results of the risk assessment.

  3. A multi-phase training campaign.

  4. Network separation and segmentation. Physical separation of the control network from other networks using a demilitarized zone (DMZ), and the division of the control network itself into segments and security zones.

  5. System Access Control. Controlling logical and physical access to the system with firewalls, authentication, authorization, VPN, and antivirus software. This effort also includes traditional physical security measures such as video surveillance, fences, locked doors and gates, and locked equipment cabinets.

  6. Device hardening, the process of configuring a device against communication-based threats. Device hardening measures include disabling unused network ports, password management, access control, and the disabling of all unnecessary protocols and services.

  7. Network monitoring and maintenance. An effective defense-in-depth campaign requires continual monitoring and system maintenance to meet the challenge of new threats as they develop.

This chapter defines the elements that help you configure a system that is less susceptible to cyber attacks.

For detailed information on the defense-in-depth approach, refer to the document Reduce Vulnerability to Cyber Attacks in the Control Room on the Schneider Electric website.

To submit a Cyber Security question, report security issues, or get the latest news from Schneider Electric, visit the Schneider Electric website.

Backing-up and Restoring the Software Configuration

To protect your data, Schneider Electric recommends backing-up the device configuration and keeping your backup file in a secure place. The backup is available in the device DTM, using "load from device" and "store to device" functions.

Remote Access to the Device

When remote access is used between a device and the motor management controller, ensure your network is secure (VPN, firewall…).

Machines, controllers, and related equipment are usually integrated into networks. Unauthorized persons and malware may gain access to the machine as well as to other devices on the network/fieldbus of the machine and connected networks via insufficiently secure access to software and networks.

WARNING
UNAUTHORIZED ACCESS TO THE MACHINE VIA SOFTWARE AND NETWORKS
  • In your hazard and risk analysis, consider all hazards that result from access to and operation on the network/fieldbus and develop an appropriate cyber security concept.
  • Verify that the hardware infrastructure and the software infrastructure into which the machine is integrated as well as all organizational measures and rules covering access to this infrastructure consider the results of the hazard and risk analysis and are implemented according to best practices and standards covering IT security and cyber security (such as: ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/ IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security).
  • Verify the effectiveness of your IT security and cyber security systems using appropriate, proven methods.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

Data Flow Restriction

To control the access to the device and limit the data flow, the use of a firewall is required (for example, a ConneXium Tofino Firewall).

The ConneXium TCSEFEA Tofino firewall is a security appliance that provides levels of protection against cyber threats for industrial networks, automation systems, SCADA systems, and process control systems.

This firewall is designed to permit or deny communications between devices connected to the external network connection of the firewall and the devices connected to the internal network connection.

The firewall can restrict network traffic based on user defined rules that would permit only authorized devices, communication types and services.

The firewall includes built-in security modules and an off-line configuration tool for creating zones within an industrial automation environment.

QR Code is a registered trademark of DENSO WAVE INCORPORATED in Japan and other countries.

Was this helpful?