PCM600 - 2.10 CSDG - Csdepl - 758440 - ENd
PCM600 - 2.10 CSDG - Csdepl - 758440 - ENd
The software or hardware described in this document is furnished under a license and
may be used, copied, or disclosed only in accordance with the terms of such license.
Trademarks
ABB is a registered trademark of the ABB Group. All other brand or product names
mentioned in this document may be trademarks or registered trademarks of their
respective holders.
Warranty
Please inquire about the terms of warranty from your nearest ABB representative.
www.abb.com/mediumvoltage
Disclaimer
This product has been designed to be connected and communicate data and
information via a network interface which should be connected to a secure network.
It is the sole responsibility of the person or entity responsible for network
administration to ensure a secure connection to the network and to take the necessary
measures (such as, but not limited to, installation of firewalls, application of
authentication measures, encryption of data, installation of anti virus programs, etc.)
to protect the product and the network, its system and interface included, against any
kind of security breaches, unauthorized access, interference, intrusion, leakage and/or
theft of data or information. ABB is not liable for any such damages and/or losses.
This document has been carefully checked by ABB but deviations cannot be
completely ruled out. In case any errors are detected, the reader is kindly requested to
notify the manufacturer. Other than under explicit contractual commitments, in no
event shall ABB be responsible or liable for any loss or damage resulting from the use
of this manual or the application of the equipment. In case of discrepancies between
the English and any other language version, the wording of the English version shall
prevail.
Table of contents
Table of contents
Section 1 Introduction.......................................................................3
This manual........................................................................................ 3
Intended audience.............................................................................. 3
Product documentation.......................................................................3
Product documentation set............................................................3
Document revision history............................................................. 4
Related documentation..................................................................4
Symbols and conventions..............................................................4
Symbols....................................................................................4
Document conventions.............................................................5
PCM600 1
Cyber Security Deployment Guideline
Table of contents
Virus scanner....................................................................................20
Malware protection .......................................................................... 20
Firewall, ports and services.............................................................. 20
Distributed installation of PCM600................................................... 21
Installing PCM600 on client computer......................................... 22
Installing PCM600 on SQL Server computer...............................23
Disabling of devices .........................................................................24
Secure boot ..................................................................................... 25
Isolation techniques .........................................................................25
User Account Control....................................................................... 25
Intrusion detection system ...............................................................26
Enabling of SQL Server 2014 for PCM600.......................................26
Section 8 Glossary......................................................................... 31
2 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 1
Introduction
Section 1 Introduction
The cyber security deployment guideline describes the process for handling cyber
security when engineering and monitoring protection and control IEDs. The cyber
security deployment guideline provides information on how to secure the engineering
environment on which the IED is installed. The guideline can be used as a technical
reference during the engineering phase, installation and commissioning phase, and
during normal service. See also all IED-related cyber security deployment guidelines.
This guideline is intended for the system engineering, commissioning, operation and
maintenance personnel handling cybersecurity during the engineering, installation
and commissioning phases, and during normal service.
PCM600 3
Cyber Security Deployment Guideline
Section 1 1MRS758440 D
Introduction
The getting started guide provides basic instructions on how to use PCM600. The
manual provides instructions for typical use cases in operation and field, as well as for
use cases in engineering and commissioning. The purpose of the manual is to describe
the PCM600 tool functionality, and it can be seen as a complementary manual to the
application-related instructions, such as the relay-specific operation or engineering
manuals.
1.3.4.1 Symbols
The tip icon indicates advice on, for example, how to design your
project or how to use a certain function.
4 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 1
Introduction
• Abbreviations and acronyms are spelled out in the glossary. The glossary also
contains definitions of important terms.
• Menu paths are presented in bold.
Select Main menu/Settings.
• Menu, tab, button, list and box names as well as window or dialog box titles are
presented in bold.
On the File menu, click New Project.
Right-click the MainApp tab and select Copy from the shortcut menu.
Click OK to start the comparing.
• Shortcut keys are presented in uppercase letters.
A page can also be added pressing the shortcut keys CTRL+SHIFT+P.
• Command prompt commands are shown in Courier font.
Type ping <devices_IP_address>/t and wait for at least one minute to
see if there are any communication breaks.
• Parameter names are shown in italics.
The function can be enabled and disabled with the Operation setting.
PCM600 5
Cyber Security Deployment Guideline
6
1MRS758440 D Section 2
Security in substation and distribution automation systems
The new generation of automation systems uses open standards such as IEC
60870-5-104, DNP3 and IEC 61850 and commercial technologies, in particular
Ethernet and TCP/IP based communication protocols. They also enable connectivity
to external networks, such as office intranet systems and the Internet. These changes
in technology, including the adoption of open IT standards, have brought huge
benefits from an operational perspective, but they have also introduced cyber security
concerns previously known only to office or enterprise IT systems.
To counter cyber security risks, open IT standards are equipped with cyber security
mechanisms. These mechanisms, developed in a large number of enterprise
environments, are proven technologies. They enable the design, development and
continual improvement of cyber security solutions also for control systems, including
distribution automation applications.
ABB understands the importance of cyber security and its role in advancing the
security of distribution networks. A customer investing in new ABB technologies can
rely on system solutions where reliability and security have the highest priority.
Reporting of vulnerability or cyber security issues related to any ABB product can be
done via cybersecurity@ch.abb.com.
PCM600 7
Cyber Security Deployment Guideline
Section 2 1MRS758440 D
Security in substation and distribution automation systems
ABB is involved in the standardization and definition of several cyber standards, the
most applicable and referred ones are ISO 2700x, IEC 62443, IEEE P1686 and IEC
62351. Besides standardization efforts there are also several governments initiated
requirements and practices like NERC CIP and BDEW. ABB fully understands the
importance of cyber security for substation automation systems and is committed to
support users in efforts to achieve or maintain compliance to these.
8 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 3
Secure system setup
• Recognizing and familiarizing all parts of the system and the system's
communication links
• Removing all unnecessary communication links in the system
• Rating the security level of remaining connections and improving with applicable
methods
• Hardening the system by removing or deactivating all unused processes,
communication ports and services
• Checking that the whole system has backups available from all applicable parts
• Collecting and storing backups of the system components and keeping those up-
to-date
• Removing all unnecessary user accounts
• Changing default passwords and using strong enough passwords
• Checking that the link from substation to upper level system uses strong enough
encryption and authentication
• Separating public network from automation network
• Segmenting traffic and networks
• Using firewalls and demilitarized zones
• Assessing the system periodically
• Using antivirus software in workstations and keeping those up-to-date
• Using principle of least privilege
PCM600 9
Cyber Security Deployment Guideline
Section 3 1MRS758440 D
Secure system setup
PCM600 does not require specific ports to be open. However, Update Manager
requires allowing outbound connections to port 80 (http protocol).
To set up an IP firewall, see the IED-specific cyber security deployment guidelines for
the ports that are used to communicate and to configure the IEDs. All closed ports can
be opened in the configuration. Ports that are open by default are used for configuring
or monitoring the protection IED.
10 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 3
Secure system setup
When PCM600 connects securely to an IED, the IED security certificate is shown.
The user can select to trust that IED forever or for the current PCM600 session.
GUID-6A1A6B90-F430-4EA9-8C13-198BB0669670 V1 EN
These certificates are added to Windows Certificate Storage and can be viewed using
the certmgr.msc management snippet in Windows.
In Certificate Manager, all IED certificates are stored under PCM Permanent Trust
and PCM Session Trust. PCM Session Trust is cleared when PCM600 is closed.
Permanently trusted IED certificates can be manually removed by deleting them from
PCM Permanent Trust.
PCM600 11
Cyber Security Deployment Guideline
Section 3 1MRS758440 D
Secure system setup
GUID-3ED547DC-8997-43A0-BC3C-6AD8F2A8223A V1 EN
All IED certificates are trusted in the current user scope. Every
PCM600 user must trust IED certificates individually.
12 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 4
PCM600 user management
This section describes the user authentication for PCM600. For IED user
authentication, see the IED-specific cyber security deployment guidelines.
When PCM600 is started for the first time, a PCM600 administrator account has to be
created and named. The password is not set by default. It is recommended to change
the password immediately for the created administrator account.
The system engineer can enable or disable the user authentication. When the user
authentication is disabled, all the users get full rights to operate. The login function
also works according to this function. For more information on the login functions, see
the getting started guide.
PCM600 13
Cyber Security Deployment Guideline
Section 4 1MRS758440 D
PCM600 user management
If the Administrator password has not been set before, it must be set
when activating user authentication.
• System Engineer acts as an administrator for the system and has full rights to
perform any function and can define the user accounts.
• Operator can perform certain simple tasks and has read-only access to certain
functionality of PCM600.
• Application Engineer can access most of the functions and has read and write
access to the IED engineering functionality.
The members of the System Engineer user category can create new user categories.
The name of the user category must be unique.
1. On the menu bar, click Tools and select Options to start the user management.
2. Select the Category Manager folder.
3. Click Add New Category to open the Add New Category dialog.
4. Type the name for the new user category.
5. Specify the rights to perform different functions under the Functions And
Rights field.
6. Select OK to save the definition.
14 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 4
PCM600 user management
1. On the menu bar, click Tools and select Options to start the user management.
2. Select the Category Manager folder.
3. Select the right user category from the drop-down list.
4. Click Delete Category to remove the user category.
5. Click Yes to confirm the delete operation.
1. On the menu bar, click Tools and select Options to start the user management.
2. Select Category Manager folder.
3. Select the right user category from the User Category drop-down list to activate
the Functions And Rights field.
4. Change the user rights by selecting one of the user levels in the drop-down menu
of the function.
The Functions And Rights field is divided into different sections for you to specify the
user rights by a specific tool component or function.
This chapter describes the user management for PCM600. For IED user management,
see the IED-specific cyber security deployment guidelines.
PCM600 15
Cyber Security Deployment Guideline
Section 4 1MRS758440 D
PCM600 user management
1. On the menu bar, click Tools and select Options to start the user management.
2. Select the User Manager folder.
The default Real Name is System Administrator and makes it easier to find the
user.
3. Click Add New User in the User Profile field.
The Add New User dialog is displayed.
4. Type User Name and select User Category from the drop-down list.
The user name must be at least three characters long.
5. Click OK to confirm.
The new user is created.
The new user name has to be a member of a user category to have permission to
PCM600 functions.
1. On the menu bar, click Tools and select Options to start the user management.
2. Select User Manager folder.
3. Select the right user name from the User Name drop-down list.
4. Click Delete User under the User Profile field.
16 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 4
PCM600 user management
1. On the menu bar, click Tools and select Options to start the user management.
2. Select User Manager folder.
3. Click Set Password under User Preferences to open Set Password dialog.
4. Type the old password.
5. Type the new password.
The password must meet certain requirements.
• Cannot be empty
• Starts and ends with an alphabetic character
• Contains at least one special character ~!@#$%^*_-+=`|\(){}[]:<>,.?/
• Is at least eight characters long
• Contains at least one number 0-9
• Contains at least one uppercase character
• Contains at least one lowercase character
6. Retype the new password for confirmation and click OK.
When changing the authentication password, the validity of password is checked and
a new password is saved to the database.
PCM600 17
Cyber Security Deployment Guideline
18
1MRS758440 D Section 5
Configuration of computer settings for PCM600
In general, the Windows operating system can be protected from the malicious attacks
with the latest service packs and security updates, firewalls, security policies,
application whitelisting, and virus scanners. In computers where PCM600 is installed,
programs and services that are not used can be uninstalled or disabled to reduce the
attack surface.
This section gives an overview of different ways to secure the operating systems on
which PCM600 is installed.
See the operating system related documentation and best practices to further reduce
the attack surface in the operating system.
Passwords must be enabled and remote wake up/wake on LAN disabled manually.
PCM600 19
Cyber Security Deployment Guideline
Section 5 1MRS758440 D
Configuration of computer settings for PCM600
There are nine update classifications defined by Microsoft. These include, for
example, critical updates, drivers, security updates and service packs. The
compatibility of PCM600 with the latest Microsoft security updates and service packs
is tested and verified monthly by ABB. The report does not cover computers from
which PCM600 is accessed remotely. In general, it is recommended to install all the
Windows updates.
PCM600 does not create specific requirements for malware protection software. It is
recommended to use organization specific de facto malware protection software,
which has to be configured manually.
PCM600 does not have specific firewall requirements. PCM600 is a client system
from the communication point of view.
When PCM600 is used in a distributed setup, see Chapter 5.8 for actions needed on the
SQL Server computer.
20 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 5
Configuration of computer settings for PCM600
In PCM600 2.10, SQL Server and PCM600 can be installed on different computers.
The server computer contains SQL Server and a shared location where PCM600
stores internal files. The client PC contains PCM600, Update Manager and
connectivity packages. PCM600 installer can perform client or server installation. For
installation instructions, see PCM600 Installation Guide.
When using the distributed setup, each user using PCM600 must have access to SQL
Server. This is done by adding the user to the PCMSERVER2014 Users user group.
The user group is automatically created after installing PCM600 on the server
computer.
GUID-469B6CDE-7ECF-469F-AADA-44AAD2A255A8 V1 EN
If no domain account is used, an account with the same name and password must exist
on both the client and the server machine.
The server machine must share the directory defined by the %PCMDATADIR%
system environment variable and the PCMSERVER2014 Users user group must be
given full privileges to that directory. If the name “PCMDatabases” is given to the
share, the client automatically has the correct path in PCMDataDir system
environment variable after the client installation.
If the server machine has firewall, it needs to allow communication to two ports.
PCM600 21
Cyber Security Deployment Guideline
Section 5 1MRS758440 D
Configuration of computer settings for PCM600
The server uses the SQL Browser service to tell the client which port the server is
listening to. The SQL Server port can be changed using SQL Server Configuration
Manager.
GUID-4F73E836-4B0A-41F0-B9DA-24B78F5F7212 V1 EN
22 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 5
Configuration of computer settings for PCM600
GUID-5295427E-6D3F-4854-A0A3-DD51AE716B42 V1 EN
PCM600 23
Cyber Security Deployment Guideline
Section 5 1MRS758440 D
Configuration of computer settings for PCM600
GUID-8AF1E3DC-60F6-4D09-AA43-5DA02D957786 V1 EN
7.5. Allow inbound TCP communication to the selected port in the Windows
firewall for SQL Server. The executable file is usually C:\Program
Files\Microsoft SQL Server
\MSSQL12.PCMSERVER2014\MSSQL\Binn\sqlservr.exe.
It is recommended to disable any unused devices in the system, such as USB ports,
CD/DVD drives, communication ports, or floppy disc controllers. Devices are
disabled manually in devmgmt.msc (Device Manager).
24 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 5
Configuration of computer settings for PCM600
PCM600 does not create specific requirements for secure boot. Secure boot should be
implemented with organization specific de facto procedures, if needed. Secure boot
has to be configured manually.
PCM600 has two dedicated functionalities that are connected to the Internet, that is,
Update Manager and ABB Lifecycle Service Tool. These functionalities are run as
separated processes from actual PCM600. It is recommended that there is more than
one network interface and a dedicated network interface is connected to the Internet.
This has to be configured manually.
A shield in the program icon indicates that it requires administrative privileges to run.
This is automatically detected by the operating system, if for example, Run as
administrator flag is set in the file properties, or if the program has previously asked
for administrative privileges.
PCM600 25
Cyber Security Deployment Guideline
Section 5 1MRS758440 D
Configuration of computer settings for PCM600
26 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 6
Project backups and restoring
1. On the File menu, click Open and select Manage Project to open the project
management.
2. Click Backup Projects functionality.
3. Select the projects from the list of available projects.
4. Click Backup Selected.
5. Browse the target location and click OK.
Creating a project backup enables transferring project data between the based systems
via different media, for instance in CD-ROM. The source and target computers do not
have to be connected to the same network so the data can be transferred between two
stand-alone computers.
All project related data is compressed and saved to one file, which is named and
located according to the definitions.
Importing a project backup enables transferring project data between the based
systems via different media, for instance in CD-ROM. The source and target
computers do not have to be connected to the same network so the data can be
transferred between two stand-alone computers.
1. On the File menu, click Open and select Manage Project to open the project
management.
2. Right-click Projects on my computer, and click Import to open the Import
project dialog box.
3. Browse the location and type the name for the imported file.
PCM600 27
Cyber Security Deployment Guideline
Section 6 1MRS758440 D
Project backups and restoring
A new project is created containing all the data from the imported file.
28 PCM600
Cyber Security Deployment Guideline
1MRS758440 D Section 7
Standard compliance statement
Cyber security issues have been the subject of standardization initiatives by ISA,
IEEE, or IEC for some time. ABB plays an active role in all these organizations,
helping to define and implement cyber security standards for power and industrial
control systems.
Some of the cyber security standards which are most important for substation
automation, such as IEC 62351 and IEC 62443 (former ISA S99), are still under active
development. ABB participates in the development by delegating subject matter
experts to the committee working on the respective standard. Since these standards are
still under development, ABB strongly recommends to use existing common security
measures available in the market, for example, VPN for secure Ethernet
communication.
Table 5: Overview of cyber security standards
Standard Main focus Status
NERC CIP NERC CIP cyber security regulation for North Released, ongoing1)
American power utilities
IEC 62351 Data and communications security Partly released, ongoing
IEEE 1686 IEEE standard for substation intelligent Finalized
electronic devices (IEDs) cyber security
capabilities
ABB has identified cyber security as a key requirement and has developed a large
number of product features to support the international cyber security standards such
as NERC CIP, IEEE 1686, as well as local activities like the German BDEW white
paper.
PCM600 29
Cyber Security Deployment Guideline
30
1MRS758440 D Section 8
Glossary
Section 8 Glossary
PCM600 31
Cyber Security Deployment Guideline
32
33
—
ABB Distribution Solutions
P.O. Box 699
FI-65101 VAASA, Finland
Phone +358 10 22 11
ABB AB
Grid Automation Products
SE-721 59 Västerås, Sweden
Phone +46 (0) 21 32 50 00
Fax +46 (0) 21 14 69 18
www.abb.com/mediumvoltage
www.abb.com/protection-control
1MRS758440 D