You are on page 1of 8

DeltaV Cyber

TM

Security Solutions

A Guide to Securing Your Process


issued by process manufacturers Policy: The Control system must be
to help protect their systems. segmented from other LANs and
These security policies serve as network devices must be
guidelines to help protect their authenticated to join the network.
systems while providing details
that can be used to audit the Secure DeltaV control
systems security level. DeltaV network
cyber security solutions will help Built for purpose and easy to
you comply with the latest implementthe foundation of a
security policies and create a more secure network
secure control system to protect The foundation for system
your process from cyber threats. security is a process control
DeltaV cyber security solutions network that is segmented from
A long history of cyber listed in this document are other LANs in the facility. Many
presented in the context of systems simply use network
security
answering the best practice routing to create this segmen-
In pioneering the use of
security policies used by many tation. But this can leave the
commercial off-the-shelf
companies. control system vulnerable.
technology in process control,
the DeltaV digital automation
systems developers always
understood the critical role of
cyber security in the open
environment. So from its very
beginning, the DeltaV systems
designers incorporated control Plant LAN Ethernet
system security as a fundamental
Ethernet Network
part of their design criteria. Today,
Emerson continues to improve
and enhance the DeltaV systems
cyber security solutions as ever
more sophisticated cyber threats
proliferate.

These threats have created the


need for a control system able to
comply with the more rigorous
security policies that are being
The DeltaV system enforces The Emerson Smart Firewall
segmentations by using a private scheduled for release in the 4th
Ethernet network so the network quarter of 2010 is specifically
stays segmented from other LANs. designed for use with the
The DeltaV system creates a built DeltaV system to make firewall
for purpose control network deployment both easy and secure.
specifically designed for process In many cases the firewall will plug
control applications. All DeltaV and play in the network. In the
workstations and controllers must event you need to set up system-
authenticate on the network specific rules, the user-friendly
before they can participate in interface makes these rules easy to
process control communications. create.
This authentication prevents Port locking provides easy access to operations personnel and easy-
to-use method insuring all unused network ports are locked down.
rogue devices from pretending
to be DeltaV workstations. Policy: Unused switch ports must be
disabled to prevent unauthorized
Policy: Networks must be protected network connections; networks
by properly configured firewalls. should be monitored for security
incidents.
Secure Your network If an unauthorized device is
perimeter with the Monitor and protect connected, the switch will reject
Emerson Smart Firewall your network with the connection and provide
The latest technology to help you DeltaV Smart Switches indication that a security breach
create the most secure system Built for purpose with security has occurred. The switch alarms if
perimeter features to protect your excess communications traffic is
network and alarm on security detected, indicating that a
Firewalls are an important element incidents possible denial of service attack is
in securing the network perimeter occurring, so a threat can be
from intrusions. Deploying DeltaV Smart Switches help secure quickly mitigated.
firewalls requires configuration by your system using auto port
experts; and an improperly lockdown and built-in security The Smart Switch provides internal
configured firewall can leave your event alarming. Port locking network diagnostics and network
network vulnerable. provides operations personnel an event alarming so you no longer
easily-accessible and easy-to-use have to rely on external SNMP
method to insure all of your applications for network
unused network ports are locked monitoring and alarming. This
downpreventing unauthorized eliminates the need for external
access to the network. network monitoring and helps
create a more secure perimeter.

Built for purpose to protect your


networks and processes.
DeltaV Cyber Security Solutions

Policy: Only secure protocols should


be used for external
Plant LAN Ethernet
communications with the control
system.

Easily create secure com-


munications using OPC
Express Interface (Xi)
Windows .Net-based interface
that addresses classic OPC
security issues

OPC Xi is a new data


communications interface
developed by a diverse group of OPC Xi data communications interface provides a secure and reliable
process industry suppliers to meet exchange of data between the automation system and the enterprise.
customer needs for a secure,
firewall-friendly, reliable, and Policy: Each user must have a user groups can easily be created to
standardized way to exchange name and password; role-based user meet specific needs. Users can be
data between the automation access should be used to assign user given privileges site-wide or
system and the enterprise. privileges based on the users job segmented by plant area. Making
function, and separation of duties it easy to create users with
OPC Xi provides a standard .Net
must be maintained for critical operating privileges in one area
interface for real-time and
functions. and view-only privileges in other
historical process data and alarms
areas to maintain a secure span of
and events data access. OPC Xi is
interoperable with new .Net-based
Easy and flexible User control for plant operations.

applications and existing OPC


Management DeltaV roles support separation
Role-based user access makes it of duties so that a critical task
COM-based clients and servers to
easy to create users with exactly cannot be performed by just one
deliver a secure data
the right privileges person. For example a person
communication patheven on
making configuration changes
legacy systems.
The DeltaV User Manager makes it may not be allowed to implement
easy to implement DeltaV user the changes without a second
OPC Xi is based on Windows
access security built on the proven person authorizing the
Communication Foundation
Microsoft password management implementation.
(WCF), the latest communications
technology from Microsoft. It capabilities and Active Directory.
enables fast and efficient data Coupled with the DeltaV role-
communications between based user access, the DeltaV User
Windows-based clients and Manager provides the tools to
servers, and delivers secure and make sophisticated role-based
reliable data communications user administration easy to
through firewalls and to non- implement and manage. Pre-
Windows systems. OPC Xi solves defined user access groups make it
the security issues associated with easy to assign users the right
using classic OPC communications privileges for their jobs. Group
through a firewall. privileges can be modified or new
Policy: Users should access the functions. Theyre locked out of Policy: Users must log in to the
system based on least privilege workstation functions they do not system using a unique user name
user access. need to access as part of their and password. Two factor
normal job functions. There are authentication should be used to
Easily assign users the also other user roles available that secure access on critical
most secure Windows allow users to create customized workstations. Operator workstations
privileges Windows security groups to meet should auto-start to the operator
The pre-built Windows security a variety of user access interface application to limit access
groups makes it easy to create requirements. In a properly to the operating system functions.
restricted users to protect your secured system most users will be
workstations designated as restricted users
those who have access only to
Fundamental to creating secure specific applications and operating
user access is to insure that users system functions. Preventing
run under Windows with least accidental or deliberate damage to
privilege having only those critical workstation files. Restricted
privileges required to do their jobs. users do not have privileges to
install programs, thus preventing
The pre-built DeltaV user role of malware from being installed on Help users stay secured
Basic Operator makes it easy to the workstation, preventing the Provide secure access to DeltaV
create restricted usersjust assign risk of infection. Restricted users workstations
the user(s) to this role and they do not have access to portable
automatically become a restricted media devices such as floppy DeltaV technology makes it easy
user. This user role has pre-defined drives, DVD or CD drives or USB to comply with security policies
privileges and is tested to ensure ports where malware could be that require individual user log-in
that users will be able to perform introduced into the workstation. for system accesswithout
all of the operator or maintenance impacting user response to critical
control functions. DeltaV
operators can easily switch users
during shift changes without
shutting down critical control
applications as they log out and in
Basic Operator to the system. The DeltaV system
makes it easy to create provides the option to auto-start
restricted users. the operator interface for
streamlined, secure user log-in
process. The DeltaV system
provides enhanced user security
by supporting two-factor
authentication using Smart Cards.

Solutions to protecting your


process from cyber threats.
DeltaV Cyber Security Solutions

Policy: Workstations shall implement and Server 2008 operating system supporting the use of Microsoft
operating system hardening configurationa further step in Windows Server Update Service
strategies to reduce the attack creating a secure, out-of-the-box (WSUS) to automatically distribute
points in the system. user experience with the DeltaV updates to all workstations in the
system. system.

In addition, Emersons Guardian


Policy: Microsoft security updates Support can totally automate the
must be applied to all workstation in security update distribution and
a timely mannerwithin days of reduce the time from certification
release by Microsoft. to deployment in your system to a
matter of days. Using your DeltaV
Confidently and easily system information, Guardian will
apply Microsoft security automatically select the correct
updates every month updates for your system and
DeltaV technologists test and ensure they are distributed to your
certify Microsoft security workstations based on your patch
Cyber harden your updates every month distribution preferences.
DeltaV Workstations
Use government-approved Keeping operating system security Emerson also offers Extended
operating system parameters to updates current is an important Software Support to help enable
secure your workstations part of maintaining a secure your installed DeltaV system to
system. Emersons expert DeltaV deploy security updates and
Best practices for cyber security technology team tests and extend its lifecycle.
dictate that Windows-based certifies the applicable Microsoft
workstations have operating security patches each month and
system parameters configured to within 72 hours of release. The
the most secure settings. The DeltaV system reduces the effort
National Institute of Standards and to maintain a secure systems by
Technology (NIST) is one well
respected provider of these secure
settings used to harden the
Microsoft operating system
against cyber attack.

DeltaV technologists have tested a


set of NIST-approved secure
settings on system workstations
for both Windows XP and
Windows 7 and for Server 2003
and Server 2008. These hardening
settings can be applied to DeltaV
workstations to help you meet site
security policies. In DeltaV v11 the
hardened settings will be applied
as part of the standard Windows 7 Guardian automatically selects the correct updates for your
system and ensures they are distributed to your workstations
based on your patch distribution preferences.
Policy: Anti-Virus software must be Policy: Process controllers must be security attack cannot be
installed on all workstations and protected from network denial of launched. The firewall is pre-
kept up-to-date with the latest service attacks such that operator configured for plug-and-play
threat signatures. workstations never lose the ability to implementation in the network so
communicate with controllers. it can be easily installed without
Confidently and easily impacting control network
manage anti-virus Maintain operator performance.
software and updates visibility to DeltaV
DeltaV software supports controllers at all times
Symantec Anti-Virus with Add an extra layer of protection Policy: Process controllers should
automatic updates to all to DeltaV controllers demonstrate communications
workstations robustness based on compliance to
device security certification
The DeltaV system supports standards.
industry standard Symantec anti-
virus and point protection, so its DeltaV controllers meet
easy to protect your network from level one Achilles
malware. Every workstation can be certification
equipped and easily managed with Certified protection from loss of
the Symantec scanning software essential control services due to
and standard tools. Emerson tests cyber attacks
to insure the Symantec software
does not interfere with the proper Achilles certification provides
functioning of the control system The DeltaV Controller Firewall is a assurance that the DeltaV
so you can be confident that purpose-built security appliance controller, when used in
protecting your system will not that is installed in the DeltaV conjunction with the controller
impact robustness. Using our Control LAN. The firewall provides firewall, will maintain essential
instructions, you can easily an additional layer of protection services such as control functions,
automate the distribution of new from denial of service attacks and process view, process alarms, and
signatures to all workstations network discovery intrusions operator command functions
based on your specific security against a DeltaV controller. The during periods of unusual or
policy requirements. Emerson firewall will filter network intentionally malicious network
Guardian Support can also deliver communications to prevent denial traffic.
new signature updates to of service attacks from impacting
eliminate the need to create control visibility and access to One of the latest cyber security
separate support arrangements essential control functions. The advances is the ability to use
with Symantec. firewall can inhibit device automated testing to validate
discovery attempts by blocking the security level of a device.
the typical methods that hackers Wurldtech Achilles certification
use to find devices to attack. provides assurance that the DeltaV
If a device cant be found or open controller, when used in con-
ports cannot be discovered then a junction with the controller

Cyber securityan essential part of


your control system implementation.
DeltaV Cyber Security Solutions

firewall, will maintain essential event journal provides details on process control system from
services such as control functions, events specifically around the internal and external threats.
process view, process alarms, and control system applications
operator command functions including user switching, and Emersons Security Assessment
during periods of unusual or security alarms from unauthorized Services will give you an
intentionally malicious network network connection attempts on assessment of security gaps and
traffic. locked DeltaV Smart Switches. latent threats to the Emerson
process control system, and
The DeltaV Smart Switch and provide prioritized improvement
controller firewall can also be recommendations that can help
configured to provide assure your process control
communication logs to a systems availability and
centralized SysLog Server so a operational integrity.
complete picture of network
communications can be Additional security-related
monitored. All of the event services include:
information is easily available to  Network security design
user-selected software for consulting for the DeltaV
consolidated analysis of security process control system and
All event information is easily available for consolidated events and communications logs. associated communication
analysis of security events and communications logs. interfaces
 Implementation support for
Policy: Employ tools and techniques Policy: DeltaV Security services are security assessment
to monitor events, detect attacks, here to help meet your unique needs recommendations
and provide identification of meeting your security policies  Consultation on updating your
unauthorized use of the system. security policy and associated
DeltaV Security Services documents to address the
The DeltaV event journal SureServices will help you create findings of the security
logs alarms, user the most cost-effective system assessment
activities and other security solution  Periodic assessment of the
system events system security conditions after
The event journal provides easy Emersons Security Assessment the initial security assessment
access to control system events Service includes an examination of findings have been addressed.
the physical and electronic
The DeltaV event journal provides security of your DeltaV process
details of user activities on the control system. The assessment is
control applications and is a great based on product security
addition to the Microsoft event installation guidelines, best
logs to provide significant practices and site security policies
information on security-related and procedures.
events happening on the DeltaV
system. Windows event logs The security assessment will
provide details on operating establish a baseline of the process
system eventssuch as failed login control system perimeter and
attempts, file access attempts and internal security conditions. This
successes. The DeltaV User baseline will include a review of
Manager also logs events to the the installation and security
Windows event log. The DeltaV procedures used to protect the
Depend on DeltaV fully in place, by being involved in
secure process control the standards development
solutions process, Emerson is able to design
DeltaV cyber security solutions security solutions that will allow
help you meet the most customers to easily meet or
stringent security requirements exceed these standards as they are
while maintaining ease of use issued in the future.
and system robustness
Cyber security has become a
Creating a secure control system necessary and essential part of
without sacrificing ease of use and control system implementation.
system robustness is a major Emerson Process Management is
challenge and is especially dedicated to helping you
important in mission-critical implement the most cost-effective
process control environments. security solutions possible so you
DeltaV system security solutions can concentrate on the core
provide an excellent balance business of producing high quality
between ease of use and security, products at the lowest cost and DeltaV Cyber Security Solutions
TM

so you can be assured of enhanced remain competitive in your


system security while maintaining marketplace.
the ease of use and robustness you
expect from your process For more information on DeltaV Emerson/DeltaV sales office. This
control system. security solutions go to information is only published on
www.emersonprocess.com/DeltaV the DeltaV System Support
DeltaV security solutions follow and search on security or Website which requires password
defense in depth layered security contact your local Emerson/DeltaV access.
practices and are designed to be sales office.
compliant with emerging cyber
security standards such as the ISA To obtain information about
SP99 Security for Industrial Microsoft Security patch
Automation and Control Systems. certifications with the DeltaV
And though the standards are not system, please contact your local

Emerson Process Management Emerson Process Management 2009. All rights reserved.
12301 Research Blvd.
For Emerson Process Management trademarks and service marks, go to
Research Park Plaza, Building III
http://www.emersonprocess.com/home/news/resources/marks.pdf
Austin, Texas 78759 USA
T +1 512.835.2190
F +1 512.832.3443 The information provided in this document is intended to educate the reader about some of the DeltaV security solutions available.
www.EmersonProcess.com/DeltaV This information represents only a portion of the activities and solutions required to implement an overall DeltaV system security
solution. Emerson Process Management does not represent or warrant, and specifically disclaims any express or implied repre-
sentation or warranty that the use of this information will prevent system disruption due to cyber-attacks, intrusion attempts or
other undesired actions. Users are solely and completely responsible for their control system security, practices and processes,
and for the proper implementation of these practices in protecting their control system.

The contents of this publication are presented for informational purposes only, and while every effort has been made to ensure their
accuracy, they are not to be construed as warrantees or guarantees, express or implied, regarding the products or services de-
scribed herein or their use or applicability. All sales are governed by our terms and conditions, which are available on request. We
Form F-00054 /Printed in USA/200 AQ/ 11-09 reserve the right to modify or improve the design or specification of such products at any time without notice.

You might also like