IndustrialSecurity Config Man 0123 en-US
IndustrialSecurity Config Man 0123 en-US
Fundamental safety
instructions 2
Configuration Manual
Security management 6
References A
01/2023
6FC5397-5EP40-6BA2
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance
are required to ensure that the products operate safely and without any problems. The permissible ambient
conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
1 Introduction ........................................................................................................................................... 7
1.1 About Industrial Security ...................................................................................................... 7
1.2 About this documentation ................................................................................................... 8
1.3 Feedback on the technical documentation ......................................................................... 10
1.4 mySupport documentation ................................................................................................ 11
1.5 Service and Support........................................................................................................... 12
1.6 OpenSSL ............................................................................................................................ 14
1.7 General Data Protection Regulation .................................................................................... 15
2 Fundamental safety instructions......................................................................................................... 17
2.1 General safety instructions................................................................................................. 17
2.2 Warranty and liability for application examples ................................................................... 18
2.3 Security information .......................................................................................................... 19
3 What is industrial security?.................................................................................................................. 21
4 Why is industrial security so important? ............................................................................................. 23
4.1 Trends with an impact on industrial security ....................................................................... 23
4.2 Possible corporate security vulnerabilities........................................................................... 24
5 Security measures in automation and drive technology..................................................................... 25
5.1 Security measures.............................................................................................................. 26
5.2 Siemens Industrial Holistic Security Concept ....................................................................... 28
5.3 Standards and regulations.................................................................................................. 29
6 Security management ......................................................................................................................... 31
7 General security measures .................................................................................................................. 33
7.1 Defense in depth concept................................................................................................... 34
7.2 Plant security ..................................................................................................................... 36
7.2.1 Physical protection of critical production areas.................................................................... 36
7.3 Network security................................................................................................................ 38
7.3.1 Network segmentation ...................................................................................................... 38
7.3.1.1 Separation between production and office networks........................................................... 38
7.3.1.2 Network segmentation with SCALANCE S ........................................................................... 39
7.3.2 PROFINET products and SNMP ............................................................................................ 42
7.3.3 Cloud Security ................................................................................................................... 42
7.3.4 Smart sensors (IoT) in the network ..................................................................................... 43
7.4 System integrity................................................................................................................. 46
7.4.1 System hardening .............................................................................................................. 46
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 3
Table of contents
Industrial Security
4 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Table of contents
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 5
Table of contents
Industrial Security
6 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Introduction 1
1.1 About Industrial Security
Digitalization and the increasing networking of machines and industrial plants are also
increasing the risk of cyberattacks. Appropriate protective measures are therefore mandatory,
especially for critical infrastructure facilities. To protect industrial plants and systems
comprehensively against cyber attacks, measures must be applied simultaneously at all levels.
From the operational up to the field level – from access control to copy protection.
Visit our website for more information on Industrial security (https://www.siemens.com/
industrialsecurity).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 7
Introduction
1.2 About this documentation
Content
The "Industrial Security" documentation contains the necessary measures and information for
planning and configuring plants and systems. The documentation serves as a reference manual
and guideline. This documentation cannot and does not want to suggest that there is 100%
security because the current range of threats is much too diverse and complex. This
documentation includes all of the necessary measures that should be taken into account for
configuring systems in a secure environment. This documentation is intended to support
machine manufacturers in safely operating their controls or plants. You, as operator, are
responsible for implementing the security measures.
Target group
This documentation is intended for manufacturers of machine tools / production machines,
particularly:
• Planners and project engineers
• IT department of end users and OEMs
The following knowledge is a prerequisite for implementing the described security concepts:
• Administration of the IT technologies familiar from the office environment
• Configuration of the SINUMERIK/SIMOTION/SINAMICS products used
Structure
The manual is essentially divided into three parts:
• Description of the topic Industrial Security in the industrial context
• General security measures: This chapter describes universal measures you can take in
general - regardless of the product used - to make your system secure
• Product-specific measures: In this chapter - structured according to MC products - special
functionalities of the products are explained, which you can use to protect your system.
Standard scope
This documentation only describes the functionality of the standard version. This may differ
from the scope of the functionality of the system that is actually supplied. Please refer to the
ordering documentation only for the functionality of the supplied drive system.
It may be possible to execute other functions in the system which are not described in this
documentation. This does not, however, represent an obligation to supply such functions
with a new control or when servicing.
For reasons of clarity, this documentation cannot include all of the detailed information
on all product types. Further, this documentation cannot take into consideration every
conceivable type of installation, operation and service/maintenance.
Industrial Security
8 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Introduction
1.2 About this documentation
The machine manufacturer must document any additions or modifications they make to the
product themselves.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 9
Introduction
1.3 Feedback on the technical documentation
Industrial Security
10 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Introduction
1.4 mySupport documentation
Note
Siemens content that supports the mySupport documentation application can be identified by
the presence of the "Configure" link.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 11
Introduction
1.5 Service and Support
Product support
You can find more information about products on the internet:
Product support (https://support.industry.siemens.com/cs/ww/en/)
The following is provided at this address:
• Up-to-date product information (product announcements)
• FAQs (frequently asked questions)
• Manuals
• Downloads
• Newsletters with the latest information about your products
• Global forum for information and best practice sharing between users and specialists
• Local contact persons via our Contacts at Siemens database (→ "Contact")
• Information about field services, repairs, spare parts, and much more (→ "Field Service")
Technical support
Country-specific telephone numbers for technical support are provided on the internet at
address (https://support.industry.siemens.com/cs/ww/en/sc/4868) in the "Contact" area.
If you have any technical questions, please use the online form in the "Support Request" area.
Training
You can find information on SITRAIN at the following address (https://www.siemens.com/
sitrain).
SITRAIN offers training courses for automation and drives products, systems and solutions from
Siemens.
Industrial Security
12 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Introduction
1.5 Service and Support
With the award-winning "Siemens Industry Online Support" app, you can access more than
300,000 documents for Siemens Industry products – any time and from anywhere. The app
can support you in areas including:
• Resolving problems when implementing a project
• Troubleshooting when faults develop
• Expanding a system or planning a new system
Furthermore, you have access to the Technical Forum and other articles from our experts:
• FAQs
• Application examples
• Manuals
• Certificates
• Product announcements and much more
The "Siemens Industry Online Support" app is available for Apple iOS and Android.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 13
Introduction
1.6 OpenSSL
1.6 OpenSSL
This product can contain the following software:
• Software developed by the OpenSSL project for use in the OpenSSL toolkit
• Cryptographic software created by Eric Young.
• Software developed by Eric Young
You can find more information on the internet:
• OpenSSL (https://www.openssl.org)
• Cryptsoft (https://www.cryptsoft.com)
Industrial Security
14 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Introduction
1.7 General Data Protection Regulation
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 15
Introduction
1.7 General Data Protection Regulation
Industrial Security
16 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Fundamental safety instructions 2
2.1 General safety instructions
WARNING
Danger to life if the safety instructions and residual risks are not observed
If the safety instructions and residual risks in the associated hardware documentation are not
observed, accidents involving severe injuries or death can occur.
• Observe the safety instructions given in the hardware documentation.
• Consider the residual risks for the risk evaluation.
WARNING
Malfunctions of the machine as a result of incorrect or changed parameter settings
As a result of incorrect or changed parameterization, machines can malfunction, which in turn
can lead to injuries or death.
• Protect the parameterization against unauthorized access.
• Handle possible malfunctions by taking suitable measures, e.g. emergency stop or
emergency off.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 17
Fundamental safety instructions
2.2 Warranty and liability for application examples
Industrial Security
18 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Fundamental safety instructions
2.3 Security information
WARNING
Unsafe operating states resulting from software manipulation
Software manipulations, e.g. viruses, Trojans, or worms, can cause unsafe operating states in
your system that may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art industrial
security concept for the installation or machine.
• Make sure that you include all installed products into the holistic industrial security concept.
• Protect files stored on exchangeable storage media from malicious software by with suitable
protection measures, e.g. virus scanners.
• On completion of commissioning, check all security-related settings.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 19
Fundamental safety instructions
2.3 Security information
Industrial Security
20 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
What is industrial security? 3
Definition of industrial security
Generally, industrial security is understood to be all of the measures for protecting against the
following:
• Loss of confidentiality due to unauthorized access to data
• Loss of integrity due to data manipulation
• Loss of availability (e.g. due to destruction of data or Denial-of-Service (DoS))
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 21
What is industrial security?
Industrial Security
22 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Why is industrial security so important? 4
4.1 Trends with an impact on industrial security
Global trends
There are many new trends which affect industrial security. These effects underscore the
relevance of security functions and measures.
• Cloud computing in general
The number of network connections across the world is constantly increasing. This
increasingly enables technologies such as cloud computing and the associated applications.
In conjunction with cloud computing, there has been a massive increase in the number of
mobile devices, such as cell phones and tablet PCs.
• Wireless technology
On the other hand, the increasing use of mobile devices has only become possible thanks to
the ubiquitous availability of mobile networks. Wireless LAN is also becoming increasingly
available. The development of new WLAN and mobile radio standards continues to advance.
• Worldwide remote access to plants, machines and mobile applications
• The Internet of Things (IoT)
Millions of electronic devices are now network-capable and are communicating via the
Internet.
To keep networked components and applications running smoothly, your plant needs a
network infrastructure and applications that reliably protect against cyber attacks.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 23
Why is industrial security so important?
4.2 Possible corporate security vulnerabilities
Possible threats:
Potential security threats include confidentiality, integrity, and availability. Examples of threats
are:
• Espionage of data
• Manipulation of data or software
• Sabotage of production plants
• System stoppage, e.g. due to virus infection or malware
• Unauthorized use of system functions
Industrial Security
24 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Security measures in automation and drive
technology 5
Siemens automation and drive technology concerns itself with security aspects at the following
levels:
• Application security refers to products and functions that take into consideration the needs
of industrial security in the field of automation. This involves particular consideration of the
application and task at hand, as well as the people performing the actions in an automated
plant. This allows industrial security to be easily implemented in production processes.
• Security support provides support during the analysis, planning, implementation, testing
and optimization of industrial security - by means of specialists with special knowledge of
networks and the industry. These services lead to the highest possible level of industrial
security and operating capacity of the production plant.
With its "Industrial Cybersecurity Services" portfolio, Siemens offers comprehensive
customer support: With this service you can implement protective measures to increase the
security level of plants and production facilities. More information about the entire
"Industrial Cybersecurity Services" portfolio is provided on the Internet (https://
new.siemens.com/uk/en/products/services/digital-enterprise-services/industrial-security-
services.html).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 25
Security measures in automation and drive technology
5.1 Security measures
Industrial Security
26 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Security measures in automation and drive technology
5.1 Security measures
See also
Always active (https://new.siemens.com/global/en/products/automation/topic-areas/industrial-
security/certification-standards.html#Alwaysactive)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 27
Security measures in automation and drive technology
5.2 Siemens Industrial Holistic Security Concept
0RQLWRULQJRI
5HVLGXDO5LVN
3URWHFWLRQ
&RQFHSW 0RQLWRULQJRIWKH
7DUJHW UHVLGXDOULVNLQRUGHUWR
3URWHFWLRQ LPSURYHWKHVHFXULW\
6HOHFWLRQDQG FRQFHSWZKHQUHTXLUHG
/HYHO LPSOHPHQWDWLRQRI
%XVLQHVV VXLWDEOHPHDVXUHVLQ
HJZKHQQHZWKUHDWV
DSSHDU
,PSDFW 6HFXULW\UHTXLUHPHQWV RUGHUWRIXOILOOWKH
$VVHVVPHQW PXVWEHIXOILOOHGE\WKH VWLSXODWHGUHTXLUH
,7LQIUDVWUXFWXUHDQG PHQWVHJFHOO
6FRSH SURWHFWLRQFRQFHSW
6LJQLILFDQFHRI ,7SURFHVVHVEDVHG
NQRZKRZSURWHFWLRQ RQLQWHUQDWLRQDO
DQGSURGXFWLQWHJULW\ VWDQGDUGV,(&
3URGXFWVDQG IRUWKHFRPSDQ\ DQG,62
EXVLQHVVDUHDVWDNHQ
LQWRDFFRXQWLQWKH
+ROLVWLF6HFXULW\
&RQFHSW
See also
Secure digitalization - holistic approach (https://securing-digitalization.dc.siemens.com/de/)
Industrial Security
28 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Security measures in automation and drive technology
5.3 Standards and regulations
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 29
Security measures in automation and drive technology
5.3 Standards and regulations
Industrial Security
30 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Security management 6
Security management process according to IEC 62443 and ISO 27001 forms the basis for the
successful implementation of industrial security.
5ISFBUBOE
SJTLBOBMZTJT
7BMJEBUJPOBOE (VJEFMJOFTBOE
JNQSPWFNFOU PSHBOJ[BUJPOBM
NFBTVSFT
(VJEFMJOFTBOE
PSHBOJ[BUJPOBM
NFBTVSFT
5FDIOJDBM
NFBTVSFT
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 31
Security management
Procedure
1. Perform a threat and risk analysis. Determine all potential risks and define countermeasures
for reducing the risk to an acceptable level.
A threat and risk analysis includes the following steps:
– Identification of threatened objects
– Analysis of value and potential for damage
– Threat and weak point analysis
– Identification of existing security measures
– Risk evaluation
– Evaluation of effects with respect to protection goals: Confidentiality, integrity, and
availability
2. Define guidelines and introduce coordinated, organizational measures.
Establish awareness of the high relevance of industrial security at all levels in the company.
Define guidelines and processes for a consistent approach to security compliance.
3. Introduce coordinated technical measures.
4. Conduct a security audit to ensure that all of the measures have been implemented and that
they have also eliminated or reduced the identified risks.
Note
Continuous process
Due to ever-changing threat scenarios, this process must be constantly repeated. Implement
the security management process as a continuous process.
See also
General security measures (Page 33)
Product-specific security measures (Page 53)
Industrial Security
32 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures 7
In this chapter you will learn about the general security measures you must take in order to
protect your system from threats.
Additional specific security measures for SINUMERIK, SIMOTION and SINAMICS products can
be found in Section Product-specific security measures (Page 53).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 33
General security measures
7.1 Defense in depth concept
%FGFOTFJO%FQUI
1MBOUTFDVSJUZ
4FDVSJUZSJTLT /FUXPSLTFDVSJUZ
GPSDFUPBDU
4ZTUFNJOUFHSJUZ
Further information on the defense in depth concept and the planning of a protection
concept for industrial plants can be found on the Internet (https://new.siemens.com/
global/en/products/automation/topic-areas/industrial-security/planning.html).
Industrial Security
34 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.1 Defense in depth concept
Protection levels
A defense in depth model has a three level structure:
• Plant security
Plant security represents the outermost protective ring. Plant security includes
comprehensive physical security measures, e.g. entry checks, which should be closely
coordinated with protective measures for IT security.
• Network security
The measures, grouped under the keyword "Network security", form the core of the
protective measures. This refers to the segmentation of the plant network with limited and
secure communication between subnetworks ("secure islands") and the interface check with
the use of firewalls.
• System integrity
"System integrity" represents the combination of two essential protection aspects. PC-based
systems and the control level must be protected against attacks. Steps include the following
measures:
– Integrated access protection mechanisms in the automation components to prevent
unauthorized changes via the engineering system or during maintenance
– The use of antivirus and whitelisting software to protect PC systems against malware
– Maintenance and update processes to keep the automation systems up-to-date
(e.g. patch management, firmware updates, etc.)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 35
General security measures
7.2 Plant security
$QODJHQVLFKHUKHLW
Unauthorized persons may be able to enter the production site/building and damage or
alter production equipment as a result of gaps in a company's physical security. Confidential
information can also be lost. This can be prevented if both the company's site and the
production areas are protected accordingly.
Company security
The company's physical security must be ensured by taking the following measures:
• Closed off and monitored company premises
• Entry control, keys / card readers and/or security personnel
• Escorting of external personnel by company employees
• Security processes in the company are taught and followed by all employees
Industrial Security
36 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.2 Plant security
Additional information
Additional information on integrated Siemens security solutions can be found on the Siveillance
page (https://new.siemens.com/global/en/products/buildings/security/security-
management.html).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 37
General security measures
7.3 Network security
1HWZRUNVHFXULW\
Network security includes all measures taken to plan, implement and monitor security in
networks. This includes the control of all interfaces, e.g. between the office network and
plant network, or remote maintenance access via the Internet.
Note
The products described in this manual must only be operated in defined protection zones.
Note
The production networks should also be divided into separate automation cells in order to
protect critical communication mechanisms.
Industrial Security
38 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.3 Network security
Requirement
NOTICE
Data misuse
Long distances between the device to be protected and the upstream security modules
represent an invitation for data misuse.
• Note that upstream security modules, such as SCALANCE S, must be installed close to the
device to be protected in a locked control cabinet. This ensures that data cannot be
manipulated here without notice.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 39
General security measures
7.3 Network security
Principle
The following application example shows cell segmentation by several SCALANCE S modules,
each of which is upstream of the automation cells. The data traffic to and from the devices within
automation cells can be filtered and controlled with the SCALANCE S firewall. If required, the
traffic between the cells can be encrypted and authenticated. Secure channels and client access
from the PCs to the cells can be established via SOFTNET Security Client, VPN client software for
PCs.
Industrial Security
40 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.3 Network security
3ODQWVHFXULW\
2EMHFWVHFXULW\
6HFXULW\PDQDJHPHQW
,QWHUQHW
66&
URXWHU
6&$/$1&( &HQWUDO
6 :HE DUFKLYH
VHUYHU VHUYHU ,QWHUQHW 6,0$7,&ILHOG3*
ZLWK62)71(7
VHFXULW\FOLHQW
6&$/$1&(
0
,QGXVWULDO(WKHUQHW
6&$/$1&(6 6&$/$1&(6
3URGXFWLRQQHWZRUN
3URGXFWLRQ 3URGXFWLRQ 3URGXFWLRQ 3URGXFWLRQ 3URGXFWLRQ
6,180(5,.
6,0$7,& 6,0$7,& 'VO
6,0$7,& 6ZLWK 6ZLWK
6ZLWK 6ZLWK &3 &3
&60 &3 $GYDQFHG $GYDQFHG
6\VWHPLQWHJULW\
6,0$7,&
6
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 41
General security measures
7.3 Network security
VPN access
Note
Note that a SCALANCE S security module must always be used for VPN access.
Note
Products with PROFINET provide the option of reading out and writing to parameters via SNMP
(Simple Network Management Protocol, Port 160/161).
• Do not only identify components based on their SNMP parameters alone, but also use the
information provided on the type plate (e.g. MAC address, serial number, etc.).
Initial orientation
• Companion Guide for Cloud - CIS Organization (https://www.cisecurity.org/press-release/cis-
controls-companion-guide-for-cloud-now-available/)
• Matrix Cloud Control - CSA Organization (https://cloudsecurityalliance.org/artifacts/cloud-
controls-matrix-v4/)
• Questionnaire Cloud Security - CSA Organization (https://cloudsecurityalliance.org/artifacts/
consensus-assessments-initiative-questionnaire-v3-1)
• Top Threats Cloud Security - CSA Organization (https://cloudsecurityalliance.org/research/
working-groups/top-threats/)
Industrial Security
42 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.3 Network security
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 43
General security measures
7.3 Network security
This interaction with the physical world made possible by IoT sensors can result in significant
cybersecurity and privacy risks:
WARNING
Risks when using IoT sensors
• Analog measured values can be easily manipulated (light intensity, temperature, voltage
can be falsified).
• The increasing use of IoT sensors can involve the acquisition of enormous amounts of
private and sensitive data, which must be handled with confidentiality.
• IoT sensors are also used to protect sensitive areas. In a worst-case scenario, a security attack
on such a device could put human lives at risk, cause significant property damage, or result
in production downtime or the like.
• IoT network interfaces often enable remote access to physical systems. Manufacturers,
vendors and third parties are thus able to remotely access IoT devices for management,
monitoring, maintenance and troubleshooting purposes. As a result, the physical systems
that are accessible via the IoT may be at much greater risk of security attacks than before.
• Many IoT devices must meet strict requirements regarding performance, reliability,
resilience, security, and other objectives. These requirements may conflict with general
security requirements and regulations in the company (e.g. regular security patches and
updates).
Whereas non-smart sensors rely exclusively on local networking, Internet networking in
smart sensors allows attacks from any location in the world that has Internet access,
increasing the machine's exposure and thus the risk of attacks.
Become aware of these risks, consider these risks in your risk analysis, and take appropriate
measures to protect your system/plant.
Industrial Security
44 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.3 Network security
Due to the risks mentioned above, keep the attack surface as small as possible when using
IoT sensors and implement the following measures:
• Ensure a secure transmission between sensor and our product (SINUMERIK, Edge,
SINAMICS). If possible, use smart sensors with integrated security measures (e.g. integrity
protection of communication).
• Ensure self-protection of the sensor (e.g. unique identifiability, redundancy in signal
processing (principle of functional safety)).
• Use only smart sensors that are compliant with the law.
• Secure physically vulnerable areas through physical measures (Siemens Industrial Holistic
Security Concept (Page 28), Defense in depth concept (Page 34)).
More information
You can obtain more useful information on the topic of "Safe use of IoT sensors" on the Internet
from the following sources:
• Only relevant for Germany: Basic IT protection compendium from the Federal Office for
Information Security (BSI) (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/
Grundschutz/International/bsi-it-gs-comp-2019.html?nn=409850)
• Open Web Application Security Project® (OWASP) (https://owasp.org/www-project-internet-
of-things/#div-seek_and_understand)
• Internal Report NISTIR 8228 (https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8228.pdf).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 45
General security measures
7.4 System integrity
6\VWHPLQWHJULW\
System integrity is understood to mean the "integrity" or "correctness" of the data or the
correct response of the system. Thus, the following measures for protecting the system
integrity should ensure that the data/functionality of the system cannot be manipulated by
unauthorized persons or that manipulations can be detected.
Industrial Security
46 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.4 System integrity
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 47
General security measures
7.4 System integrity
7.4.1.6 Passwords
NOTICE
Data misuse caused by using passwords that are not secure enough
Data can be easily misused by using passwords that are not secure enough. Insecure passwords
can easily be guessed or decoded.
• Therefore, change the default passwords during the commissioning and adapt them at
regularly defined intervals.
• Also change passwords for functions that you yourself do not use to ensure that such
unused functions are not misused.
• Always keep your passwords secure, and ensure that only authorized persons have access
to these passwords.
Industrial Security
48 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.4 System integrity
Note
Complying with product security notifications
Threats are extremely diverse in nature and are continually changing. As a consequence, always
keep yourself up-to-date on a regular basis through the Industry Online Support (https://
support.industry.siemens.com/sc/ww/en/sc/2090) regarding whether there are new and
relevant product security notifications for your particular products. Comply with the instructions
provided in the product security notifications.
NOTICE
Data misuse when using online virus scanners
If you use an online virus scanner, then security-relevant or confidential data can get into the
wrong hands and be misused.
• Therefore, do not check any security-relevant or confidential data via an online virus
scanner.
Note
Keep virus scanners up-to-date
Always ensure that the virus scanner database is always up-to-date.
Note
Do not install several virus scanners together.
You must always avoid installing several virus scanners together in one system.
Note
Operation in a local network
Always use a virus scanner when locally connecting with the plant or system network.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 49
General security measures
7.4 System integrity
7.4.1.9 Whitelisting
The basic philosophy of whitelisting is that all applications are mistrusted, unless they have been
classified as trustworthy after an appropriate check. This means that a whitelist is maintained in
the system. This whitelist therefore contains all applications that have been classified as
trustworthy and consequently can be run on your PC systems.
Whitelisting mechanisms provide additional/alternative protection against undesired
applications or malware and unauthorized changes to installed applications or executable
files (.exe, .dll).
Heed the corresponding product-specific information (Page 53) to determine whether the
use of virus scanners and/or whitelisting is recommended.
WSUS
The WSUS (Windows Server Update Service) system functionality provided by Microsoft is
available for current Windows systems. WSUS supports administrators by providing Microsoft
updates in large local networks. WSUS automatically downloads update packages (Microsoft
update) from the Internet and offers them to the Windows clients for installation.
The fully automatic update process ensures that Microsoft security updates are always
available on Siemens clients.
NOTICE
Security gaps for out-of-date operating systems
Note that security updates, hotfixes, etc. are no longer supplied by Microsoft for obsolete
operating systems < Windows 10. As a consequence, dangerous security gaps can occur with
your operating system.
• Therefore always upgrade your operating system - if possible - to the latest version.
• If you work with an older operating system, take appropriate additional measures (e.g.
Allow-List) to protect your system.
Note
Before installing Microsoft Updates, note the following important points:
• Prior to the update, back up the system status in the case that you have to restore the
original software. Ensuring the compatibility of the update with the individual system
configuration is the responsibility of the customer.
• Never establish a direct connection to the WSUS server in the Internet! Ensure that the
environment is secure and install an intermediate layer (e.g. DMZ network, firewall,
SCALANCE S modules, etc.).
Industrial Security
50 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
General security measures
7.4 System integrity
Note
Out-of-date product software also represents a potential security gap for attacks.
• As a consequence, always install the latest product software versions.
NOTICE
Corruption of data and the resulting malfunctioning of the system
For automation and drive systems as well as controller components, data such as archives and
programs can be imported from external sources. This data influences the behavior of these
systems and should therefore be protected against unauthorized changes.
Data such as archives, programs, and OA applications can also be saved and archived. The
systems currently do not provide the capability of ensuring the integrity of programs, archives,
and OA applications.
Therefore take your own measures for ensuring integrity to guarantee the data integrity of your
archives, OA applications, or other saved data:
• Apply the Siemens Industrial Holistic Security Concept.
• Use digital signatures to protect data.
• Ensure there is sufficient access protection:
– Restrict access rights such as to data archives/Sharepoints accordingly.
– Do not send any unencrypted/unsigned emails.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 51
General security measures
7.4 System integrity
7.4.4 Disposal
The products are to be disposed of in accordance with the respectively valid national regulations.
The products described in this manual are extensively recyclable on account of the low-toxic
composition of the materials used. To recycle and dispose of your old equipment in an
environmentally friendly way, please contact an appropriate disposal company.
NOTICE
Misuse of data resulting from insecure methods of deleting data
Incomplete or insecure deletion of data from memory cards or hard drives can lead to misuse
of the data of the part programs, archives, etc. by third parties.
• Therefore ensure that all storage media are securely deleted before disposing of the
product :
• There are programs that support you in securely deleting/formatting storage media.
Alternatively, contact a certified data destruction specialist to take care of this task.
Also observe the special disposal information of the products in Chapter Product-specific
security measures (Page 53).
Industrial Security
52 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures 8
In this chapter, you will find additional product-specific security measures for the SINUMERIK
products and the CNC Shopfloor Management Software, SIMOTION, SINAMICS and SIMOCRANE.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 53
Product-specific security measures
8.1 SINUMERIK
8.1 SINUMERIK
The following chapter provides you with an overview of the security-related measures you must
take to protect your classic SINUMERIK control from threats. Detailed descriptions and
procedures can be found in the corresponding SINUMERIK documentation.
We are currently providing product-specific, security-relevant measures and features
specifically for SINUMERIK ONE control systems in a separate document. This
Configuration Manual is specifically designed to meet the requirements of the new
security standard IEC 62443. In the future, you will find it on the Internet at
the following address: Industrial Security SINUMERIK ONE Configuration Manual (https://
support.industry.siemens.com/cs/ww/en/view/109808781)
Detailed descriptions of existing security features are also provided in the SINUMERIK ONE
product documentation / online help.
Many products (SINUMERIK, SIMOTION, SINAMICS) contain OpenSSL. The following applies to
these products:
• This product contains software (https://www.openssl.org/) that has been developed by the
OpenSSL project for use in the OpenSSL toolkit.
• This product contains cryptographic software (mailto:eay@cryptsoft.com) created by Eric
Young.
• This product contains software (mailto:eay@cryptsoft.com) developed by Eric Young.
NOTICE
Data misuse via an unprotected interface
Since the X120 interface of the NCU or the eth2 port of the IPC are not protected by a firewall,
there is a risk of misuse of data. The interface only provides the option of establishing a
connection to the local plant/system network.
• As a consequence, never connect this local network with the Internet/company network.
Industrial Security
54 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
(WKHUQHW )LUPHQQHW]ZHUN
HWKZLWK )LUHZDOO
ILUHZDOO 6HUYHU
6,180(5,.23
3&87&8
HWK
6,180(5,.
RSHUDWRUSDQHO
&RPSDQ\QHWZRUN
;ZLWKILUHZDOO &RPSDQ\QHWZRUN
/RFDO+0, ;ZLWKILUHZDOO
SODQWV\VWHP
QHWZRUN
;
6,180(5,.['
;
/RFDOVHUYLFH
;
;EHL6,180(5,.21(
352),1(7
6,180(5,.21(
6,180(5,.'VO
Firewall settings
Ethernet interface X130 of the NCU and the eth1 interface of the IPC are protected by a firewall
for security reasons. If individual programs require access to a communication port for
communication purposes, you can activate or deactivate the firewall via SINUMERIK Operate.
Additional ports can be separately released.
Alternatively, you can configure the firewall via the "basesys.ini".
Further information
Further information on the configuration of the firewall and default settings can be found in the
following manuals:
• SINUMERIK Operate (IM9) (https://support.industry.siemens.com/cs/de/en/view/
109769186)
• Diagnostics Manual (808D) (https://support.industry.siemens.com/cs/de/en/view/
109763685)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 55
Product-specific security measures
8.1 SINUMERIK
NOTICE
Misuse, manipulation and theft
Modules, such as the NCU, are open equipment. If not protected, there is the risk of misuse by
unauthorized personnel, manipulation or theft of data (e.g. CompactFlash Card).
• As a consequence, always install NCUs in housings and locked control cabinets or in
electrical rooms. Only appropriately trained and authorized personnel may access these
housings, electrical cabinets and electrical rooms. Information on the permitted locks can
be found in Chapter Physical protection of critical production areas (Page 36).
• Further information on the control cabinet installation of the NCU can be found in the
SINUMERIK 840D sl NCU 7x0.3 PN Manual (https://
support.industry.siemens.com/cs/ww/en/view/109782727) or in the corresponding
Equipment Manuals for SINUMERIK ONE: "NCU1750" and "NCU1760".
Note
Only operate the machine control panels (MCP/MPP) on an internal, local machine network and
secure them against any possible external access.
Note
Firmware update
For MCP/MPP/PP72-48 firmware updates or module diagnostics (Port 3845) contact Siemens
Service&Support (https://support.industry.siemens.com/sc/ww/en/sc/2090).
See also
Passwords (Page 48)
Industrial Security
56 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Deactivating interfaces
Measure Description
Deactivate/activate Ethernet You can activate or deactivate the Ethernet interfaces in the BIOS of the PCU.
interfaces in the BIOS of the You can find detailed information on this in PCU-Basesoftware (IM8) Commissioning Manual
PCU (https://support.industry.siemens.com/cs/de/en/view/109748542), Chapter "BIOS settings".
Deactivating/activating To prevent malware entering the control or the plant network via the USB interfaces, you can
USB interfaces disable the USB interfaces of the NCU. Use the service command "sc_usb disable". Enter the
relevant command on the Service Desktop in the "Run" dialog box or at the prompt. Use this
function to make your system more secure and protect it from unwanted manipulation and
malware.
Further information can be found in the PCU-Basesoftware (IM8) Commissioning Manual
(https://support.industry.siemens.com/cs/de/en/view/109748542), Chapter "How to discon‐
nect the USB interfaces".
Deactivating ports
Measure Description
Deactivating the PROFINET In STEP 7 HW Config, a PROFINET interface port of a SINUMERIK PLC can be deactivated (X150).
port for It is activated by default. The SINUMERIK PLC cannot be accessed via a deactivated PROFINET
SINUMERIK 840D sl PLC interface port.
Further information can be found in the SIMATIC S7-300 CPU 31xC and CPU 31x Equipment
Manual: Technical specifications (https://support.industry.siemens.com/cs/de/en/view/
12996906), Chapter "Configuration of the port properties".
No communication function.
Note that no communication functions, such as PG/OP functions, open IE communication or S7
communication (PROFINET IO), are possible via a deactivated port.
Deactivating the PROFINET The PROFINET port can be deactivated in the TIA Portal under "Device configuration". Select the
port for SINUMERIK ONE PLC PLC and then switch to the menu "General > PROFINET interface> Advanced op‐
tions > Port > Port options". Uncheck the box for "Activate this port for use".
Further information can be found in the TIA Portal online help.
Deactivating For secure operation, only one defined access point should be available to the network for
a PROFINET port of diagnostics/maintenance. All of the other ports to the controls, devices, or switches (Scalance
SCALANCE X switch X) should be deactivated. This prevents unauthorized access.
(possible as of the X200 ser‐ Further information can be found in the SIMATIC NET Configuration Manual: SCALANCE X-200
ies) Industrial Ethernet switches (https://support.industry.siemens.com/cs/de/en/view/
109757352), Chapter "Ports".
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 57
Product-specific security measures
8.1 SINUMERIK
Note
System hardening for software solutions
When using SINUMERIK Integrate software and other PC applications (e.g. Create MyConfig
(CMC) or Access MyMachine (AMM)), make sure that the PC on which the software is used,
always fulfills the requirements of industrial security.
These include, for example:
• Current Microsoft security updates
• Current virus scanner software
• Activated firewall, etc.
Further information can be found in Section System integrity (Page 46).
Note
Only signed software
The SINUMERIK ONE NCUs have a Secure Boot feature that ensures that only software that is
signed by Siemens can be loaded onto the NCU. This concerns both GIV software versions of the
controller and any other software (e.g. SINAMICS TEC). Once a *.tgz file is imported and there
is no accompanying *.sig file, the NCU will no longer ramp up.
In this situation, the controller can no longer be accessed via any interface. The previously
installed software can no longer be deleted.
In the context of the length of the service life of a machine tool, the use of antivirus software
does not make sense.
Industrial Security
58 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Note
Measures for protecting against viruses in a CNC environment
Take all the necessary measures for virus protection in the CNC environment. This also includes
the proper handling of data storage media, USB sticks and network connections, precautionary
measures when copying data and during software installations, etc.
See also
Virus signatures (https://support.automation.siemens.com/WW/view/en/19577116)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 59
Product-specific security measures
8.1 SINUMERIK
8.1.5.1 Whitelisting
WARNING
Risk of death due to software manipulation when using exchangeable storage media
Storing files on exchangeable storage media poses an increased risk of infection, e.g. with
viruses and malware. Incorrect parameter assignment can cause machines to malfunction,
which can lead to injuries or death.
• Protect files stored on exchangeable storage media from malicious software using
appropriate protection measures, e.g. virus scanners.
Note
Before installing Microsoft Updates, note the following important points:
• Prior to the update, back up the system status for a fallback, if necessary. Ensuring the
compatibility of the update with the individual system configuration is the responsibility of
the customer.
• Never establish a direct connection to the WSUS server in the Internet! Ensure that the
environment is secure and install an intermediate layer (e.g. DMZ network, firewall,
SCALANCE S modules, etc.).
Industrial Security
60 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Since it is usually difficult to regularly update the Windows operating system of an IPC for
a machine that is in use, and no more updates are available after the end of the support
period, you should ensure the IPC is protected in accordance with the Defense in Depth
concept (Page 34), e.g. by means of a security router and the use of a whitelisting solution.
Possibly identified security weak points of the NCU are taken into account or corrected in the
current CNC software version.
Note
Availability
The availability of Microsoft security updates is published via Microsoft Security Bulletins. The
use of security updates is entirely up to the customer and is their sole responsibility. This can be
realized based on the "evaluation of maximum severity" provided in the Microsoft Security
Bulletin. Microsoft publishes information on security updates for the PCU and download links on
the Internet (https://technet.microsoft.com/en-us/security/bulletins).
See also
Patch management (Page 50)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 61
Product-specific security measures
8.1 SINUMERIK
Corresponding to the named user, there is always a Unix group with the same name (also
with the GID to the UIDs). As user, you are always member of your own group and also in
all "lower-level" groups. For example, "operator2" is a member of the "operator2", "operator1"
and "operator" groups. The file access rights are mainly controlled via these groups.
NOTICE
Data misuse caused by using passwords that are not secure enough
Data can be easily misused when passwords that are not secure enough are created. Passwords
that are not secure enough can be easily hacked into.
The default passwords for the basic commissioning procedure are listed in the documentation.
• Therefore, always change the preassigned default passwords during commissioning
• Change the passwords at regularly defined intervals.
• For CNC software <V4.8: During commissioning, change the Linux password in addition to
the SINUMERIK Operate passwords. You can find additional information in the
Commissioning Manual "NCU operating system".
• A continuous warning appears on the SINUMERIK ONE if the default passwords are not
changed.
Further information on assigning secure passwords can be found in Chapter Passwords
(Page 48).
Industrial Security
62 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Note
Changing passwords between SINUMERIK Operate and Linux
The access levels for SINUMERIK Operate and Linux are merged as of software version 4.8 SP3
(840D sl/828D) and 6.13 (SINUMERIK ONE). Changing a password for SINUMERIK Operate
simultaneously changes the relevant password in Linux and vice versa. It is important to note the
following behavior:
• When a general NC reset is performed, no passwords are reset to the default passwords.
• Following a software upgrade, the SINUMERIK Operate passwords apply to the NC
unchanged.
• Once a password has been changed, it cannot be reset to its original state.
• When recommissioning the system with Restore [-full] (menu item in the Emergency Boot
System "Recover system from USB memory stick (reformat CF card)"), the CF card is formatted
and restored to a system in the delivery state. The passwords are not included in the
SINUMERIK archive. Therefore, always change the default passwords after a Restore [-full] to
individual passwords.
Note
The SINAMICS Safety password must be used for SINUMERIK Safety
The assignment of the Safety Integrated password using the SINUMERIK Operate screen is
supported as of V4.8 SP2 HF1. The assignment of the Safety Integrated password is also
supported by a screen form of the SINUMERIK ONE Commissioning Tool.
• Always set a Safety password to prevent parameters from being changed using the external
configuration software Starter or the commissioning software SINAMICS Startdrive.
Further information can be found in the Safety Integrated plus Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109777982).
Further information
You can find further information on how you can change the passwords of the access levels
along with other information on access levels for programs and softkeys and access rights for
files in the SINUMERIK Operate (IM9) Commissioning Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801207), Chapter "General settings > Access
levels".
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 63
Product-specific security measures
8.1 SINUMERIK
Note
Only for SINUMERIK 828D
Note that the CNC lock function is only available on the SINUMERIK 828D controller.
Further information on the CNC lock function and on the creation of a lockset file can be
found at:
• "SINUMERIK Integrate Access MyMachine /P2P (PC)" Operating Manual (https://
support.industry.siemens.com/cs/de/en/view/109770206)
• "PLC" Function Manual, Chapter "P4: PLC for SINUMERIK 828D > CNC lock function"
Application
Removing the SSH key preinstalled by Siemens reduces the risk of data misuse. However, in order
to ensure sufficient access to the system, you can define and install your own SSH key.
Service command
The service command 'sc' is a tool used for performing a range of service tasks on a SINUMERIK
NCU:
This command deletes all of the SSH keys preinstalled by Siemens on the control. When
called from the service system, the keys on the CompactFlash card are affected, and not the
SSH keys on the service system itself.
Further information
You can find additional information in the Base Software and Operating Software
Commissioning Manual (https://support.industry.siemens.com/cs/de/en/view/109763236).
Industrial Security
64 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Note
• If you activate the PLC Web server in the S7 project, you must define an appropriate user and
an associated password for it. Create a secure password. When creating a new password,
carefully follow the information provided in Chapter Passwords (Page 48).
• Only use the HTTPS protocol to establish communication confidentiality and integrity.
Further information
Further information on the PLC web server can be found in the Function Manual S7-1500, ET
200SP, ET200pro web server (https://support.industry.siemens.com/cs/ww/en/view/
59193560).
Note
Applicability of modified access levels for softkeys
The setting of specific access levels for softkeys on a PCU only affects the respective PCU softkeys
themselves. To implement access rights on the NCU, both the manufacturer and the user must
use the appropriate mechanisms and set the rights accordingly.
Further information can be found in the SINUMERIK Operate (IM9) Commissioning Manual
(https://support.industry.siemens.com/cs/ww/en/view/109801207), Chapter "Access levels for
programs".
Further information
Further information on BIOS settings of the PCU 50 can be found in the PCU-Basesoftware
(IM8) Commissioning Manual (https://support.industry.siemens.com/cs/de/en/view/
109748542).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 65
Product-specific security measures
8.1 SINUMERIK
NOTICE
Data misuse due to incorrect assignment of rights
Access data, such as the pre-configured passwords for access to the control system, can be
stolen and misused.
• For that reason, set up organizational measures to ensure that only authorized persons are
given access to these files.
Note
Password protection for linked external files
The protection mechanisms integrated into CMC (password protection) are ineffectual for linked
external files that are integrated into the CMC context.
Note
Protecting CMC packages from reimporting
Note that CMC packages have to be protected by password against being reimported.
• For that reason, always set up a password against reimporting when you assign a password
for a new project.
Industrial Security
66 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
For cycles with cycle protection, execution in the NC is possible without any restrictions.
In order to protect the manufacturer's know-how, any type of view is inhibited for cycles with
cycle protection.
This software option is available for SINUMERIK 808D, 828D and 840D sl control systems and
SINUMERIK ONE.
You can find an application example for cycle protection for SINUMERIK on the Internet
(https://support.industry.siemens.com/cs/ww/en/view/109474775).
Further information
Further information on cycle protection can be found in the SINUMERIK Access
MyMachine /P2P (PC) Operating Manual (https://support.industry.siemens.com/cs/ww/en/view/
109811131).
Further information
You can find further information on block protection in the SIMATIC Programming with STEP 7
Programming and Operating Manual (https://support.industry.siemens.com/cs/de/en/view/
109751825), Chapter "Block properties".
Note
The integrated CP in the SINUMERIK 840D sl does not support the "Module access protection /
protection level" option.
Encryption of blocks
As of STEP 7 Version 5.5 SP3 and the CNC system software V4.5 SP2 for 840D sl/ 840D sl or V6.13
for SINUMERIK ONE, you can create encrypted block protection for functions and function blocks
in the offline and online view. You can use this function to encrypt your blocks and protect the
block code against external access.
The option "SINUMERIK" and, if required, "SIMATIC" must be selected for the encryption with
SINUMERIK.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 67
Product-specific security measures
8.1 SINUMERIK
A detailed procedure of how to encrypt your blocks can be found on the Internet (https://
support.automation.siemens.com/WW/view/en/45632073).
8.1.8.3 OPC UA
OPC UA (Unified Architecture) is a standardized, industrial communication protocol for access to
control data, e.g. by higher-level control systems. Variables of a SINUMERIK 840D sl,
SINUMERIK 828D or SINUMERIK ONE can be read and written to via this communication protocol
using the SINUMERIK Integrate Access MyMachine /OPC UA software option.
NOTICE
Date misuse resulting from an insecure connection to the client
There is a danger of data misuse due to an unencrypted connection to the OPC UA client.
• Therefore, always encrypt your connection to the OPC UA client.
• Information on the encryption of the data connection can be found in the SINUMERIK
Access MyMachine /OPC UA Configuration Manual (https://
support.industry.siemens.com/cs/us/en/view/109807257).
NOTICE
Data misuse due to incorrect user administration / rights assignment
A significant security risk can ensue through incorrect user administration and faulty right
assignment. Users can access data or actions for which they have not been authorized.
• As a consequence, always very carefully consider which users are assigned which rights. As
administrator, you are responsible for professional user administration and assignment of
rights.
Note
Selecting a secure password
Always set a secure password for your connection to the OPC UA client! Further information on
selecting a secure password can be found in Section Passwords (Page 48).
Industrial Security
68 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.1 SINUMERIK
Further information
Further information on the topic of secure user administration can be found in the TIA Portal
online help.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 69
Product-specific security measures
8.1 SINUMERIK
Note the general information on secure data storage with regard to archives in Section Data
storage (Page 47).
NOTICE
Misuse of confidential data on the control system
On the control system, there is a risk of confidential data being misused.
• As a consequence, it is not permissible to load confidential data to the control (e.g. using the
"SINUMERIK Integrate Access MyMachine/P2P" software).
• Always store confidential data in an encrypted form locally on an encrypted storage location
in the network.
8.1.10 Disposal
NOTICE
Misuse of data resulting from insecure methods of deleting data
Incomplete or insecure deletion of data from memory cards or hard drives can lead to misuse
of the data of the part programs, archives, etc. by third parties.
• Therefore ensure that all storage media are securely deleted before disposing of the
product :
• There are programs that support you in securely deleting/formatting storage media.
Alternatively, contact a certified data destruction specialist to take care of this task.
Industrial Security
70 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
In
Cloud MindSphere
In MCenter
Line
In SINUMERIK
SINUMERIK
Machine Edge
MindSphere provides state-of-the-art security during on-site data collection and when
transferring and saving to the Cloud.
The security framework is oriented on the principles of industry standards, e.g. IEC 62443,
International Organization for Standardization (ISO)/IEC 27001, and the Federal Office for
Information Security (BSI) and recommendations from authorities on working with data in
Cloud environments.
In accordance with proven communication practices of the industry, all communication
between the client and MindSphere is protected by TLS V1.2 via public end points.
Reliable x509 certificates from the Siemens Trust Center are used. These correspond to
the requirements of the European Telecommunications Standards Institute (ETSI) and of the
Certification Authority Browser Forum (CA/B Forum).
Further information on encryption for MindSphere can be found in
the MindSphere Whitepaper (https://www.plm.automation.siemens.com/global/en/topic/
mindsphere-whitepaper/28842).
Saved data is always saved by Siemens on high-performance servers in the computer centers
of the infrastructure providers. All of the infrastructure centers meet the highest standards
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 71
Product-specific security measures
8.2 CNC Shopfloor Management Software
for data security and are protected against cyber threats. As commercial providers of a Cloud
IaaS (Infrastructure as a Service), they provide higher security standards than typical private,
local facilities for data storage. The computer centers are operated in accordance with the
Best Practices of the industry.
As an additional layer of security, all of the Cloud infrastructure partners must ensure on-site
security measures such as electronic photo ID badges, card owner access control, biometrics,
digital video monitoring with recording and alarm monitoring.
Figure 8-3 MindSphere
Security standards for SINUMERIK and other supported control systems with MindSphere
connection
The connection between control systems and MindSphere via TLS 1.2 /HTTPS complies with the
highest security standards.
SINUMERIK versions and software versions of other supported control systems that do not
comply with these standards are not part of the product. Additional security measures must
be taken for these versions.
You are solely responsible for preventing unauthorized access to your plants, systems,
machines, and networks. Systems, machines and components should only be connected to
the company network or the Internet when necessary. And if so, only if appropriate security
measures (e.g. use of firewalls and network segmentation) are in place.
NOTICE
Data misuse due to an unprotected Internet connection
An unprotected Internet connection can lead to data misuse, e.g. when transferring asset data.
Therefore, before you establish a network connection, make sure that your PC is connected to
the Internet only through a secure connection. Pay attention to the security-relevant notes.
Industrial Security
72 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
Plant and system security for SINUMERIK control systems/other supported control systems
The necessary security measures (e.g. virus scanners, firewalls, operating system patching, etc.)
must be implemented and updated on the control systems.
Note
As user of Manage MyMachines /Remote, always ensure that you operate the product with the
latest versions of SINUMERIK Integrate client/client of other supported control systems and
Manage MyMachines /Remote Service Engineer and Machine Operator Clients. Also follow the
guidelines for industrial security contained in Chapters 1.3 and 2.3 of the Manage MyMachines /
Remote Function Manual (https://support.industry.siemens.com/cs/ww/en/view/109759394).
SINUMERIK control systems and other supported control systems are connected to
MindSphere via "TLS 1.2 /HTTPS" complies with the highest security standards.
The automatic confirmation of the machine identity, used in conjunction with token provided
in MindSphere for the onboarding of the machine, ensures that the correct machine is
accessed during a remote session.
Disposal
To completely remove an installation of Manage MyMachines /Remote, you should ensure that
all of the software and certificates have been properly deleted from your Microsoft Windows
device or SINUMERIK control system or any other supported control systems, including backup
systems. The data will continue to be available in MindSphere, unless the tenant is closed.
More information on the topic of disposal can be found in the Manage MyMachines /Remote
Function Manual (https://support.industry.siemens.com/cs/ww/en/view/109759394).
More information on general concepts for secure remote access to industrial plants can be
found in the following documents:
• cRSP IT Security Concept (https://support.industry.siemens.com/cs/ww/en/view/
109759394)
• Siemens common Remote Service Platform (cRSP) (https://www.downloads.siemens.com/
download-center/Download.aspx?pos=download&fct=getasset&id1=A6V11272777)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 73
Product-specific security measures
8.2 CNC Shopfloor Management Software
Secure archiving
When archiving your exported data, keep in mind that you are responsible for ensuring that this
data is archived securely.
This includes, for example, the following measures:
• Save exported data to an area with restricted access within the OEM/end user location:
– e.g. on SharePoints with access restrictions
– or databases with user administration/authorization
• Protect your encrypted data storage locations, such as SharePoints, against manipulation.
• If necessary, store your confidential or security-relevant data only as encrypted data on your
PC/system or in the network. Security-relevant data includes sensitive data such as archives,
passwords or executable files (*.exe).
• Regularly back up your security-relevant data and carefully protect it from loss and tampering.
See also
cRSP IT security concept (https://www.downloads.siemens.com/download-center/
Download.aspx?pos=download&fct=getasset&id1=A6V11272775)
Note
For recommended security measures for the Analyze MyPerformance product, observe the
recommendations and measures for Manage MyMachines (Page 72).
8.2.3.1 MCenter
Note
Access to the resources of the MCenter server
Read and write access to the file system and resources of the operating system (in particular to
the Microsoft Windows Registry) of the MCenter server is only enabled for users with
administrator rights. Make sure that these administrator IDs have sufficiently strong passwords.
Industrial Security
74 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
NOTICE
Data manipulation possible
Within the production/machine network (intranet), there is a risk that a hacker can access the
file system of the MCenter server or the various MCenter clients. There, the hacker can
manipulate various system components (e.g. the content of databases). As a consequence, the
attacker can change tool data, NC programs, machine archives or the system structure itself,
for example. This type of attack cannot be prevented by MCenter.
• As the person responsible for the machine network, it is therefore imperative that you take
the appropriate industrial security measures for the production/machine network.
NOTICE
Data misuse by using open programming interfaces
There is a potential risk of data misuse when using open programming interfaces.
• Therefore, when using open programming interfaces, only use clients that at least
communicate with the MCenter server via "TLS /https" communication paths.
Note
• For a secured communication (HTTPS) between a client and the server, you require a digital
certificate that confirms the identity of the server.
• If the database is running on a separate server, encrypted SQL communication requires a
certificate on the DB server.
For more information, see the Mcenter Installation Manual, sections "Setting up an encrypted
connection" and "Setting up encrypted communication for SQL server".
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 75
Product-specific security measures
8.2 CNC Shopfloor Management Software
System hardening
System hardening is the removal of all software components and functions that are not
absolutely required by the desired application to fulfill the intended task.
To protect your assets or production unit, you must have the appropriate knowledge and the
installed system must be hardened. System hardening should be based on the appropriate
Microsoft and other hardening guidelines. For example, you can find expert instructions in
CIS (Center for Internet Security) manuals or, if accessible, in documents available at the
company, or you can choose the source that best suits you.
Installation and maintenance technicians need to continuously improve their industrial
security knowledge because information security threats are increasing by the day. System
security risks are increasing continuously, and as a Siemens customer you need to prepare
accordingly.
You can reuse system configurations that have already been hardened. However, these
configurations should also be reviewed periodically and new rules must be applied.
Examples:
• If a remote desktop connection is provided, the highest possible security configuration must
be ensured to avoid a possible MITM (man-in-the-middle) attack.
• Protect your system from code injection by using state-of-the-art technology and expertise.
• Store certificates securely so that they cannot be exported by unauthorized entities. In such
cases, you must follow the hardening guidelines when setting up.
• Servers must run in a secure, restricted server zone/server room that can only be accessed by
authorized personnel.
• Encrypt server memory or the data on it to prevent attacks on the system if the system is
physically compromised.
• Back up your system regularly to protect your data.
• The license server is provided or available only locally.
Industrial Security
76 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
Note
Network file exchange via common drives (Server Message Block, SMB)
If you use SMBs for exchanging files with MCenter functions, only use standard authentication
mechanisms (user name / password). Also restrict the accesses for each user accordingly. Data
storage on shared drives should be kept to a minimum.
Virus scanner
Protect files from malware using appropriate protection measures, such as virus scanners.
Use an external virus scanner when uploading files with Mcenter and its applications.
Data backup
For data backup on machine tools, see Section "Data backup (Page 69)".
Create a backup copy of your data in the following cases:
• Before and after upgrading the software
• After setup/commissioning
• When changing the hardware configuration
• After replacing the hardware
• On a regular basis
The backup must contain all elements of Mcenter, such as:
• Database
• IIS configuration
• License server
• Applications
Firewall settings
Make absolutely sure that firewalls are "enabled" and only open ports that are actually used and
absolutely necessary for operation. Other ports must not be left open, as they could also provide
another attack surface.
If a remote desktop connection is provided, the highest possible security configuration must
be ensured to avoid a possible MITM (man-in-the-middle) attack.
Prepare yourself against DoS (Denial of Service) attacks, for example, by setting up
appropriate firewall rules, implementing an IPS (Intrusion Prevention System) and/or a WAF
(Web Application Firewall).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 77
Product-specific security measures
8.2 CNC Shopfloor Management Software
Note
In case of suspicious e-mails, you should pay attention to the following:
• Be on your guard when you receive e-mails from someone you do not know, especially if the
e-mails contain links and attachments. Never open suspicious attachments and do not click
on any links in the e-mail.
• Carefully check the sender’s complete e-mail address.
• Check the integrity of the links embedded in the e-mail (e.g. by moving the mouse over the
link). Telltale signs are misspellings or links containing a confusing company name.
• Use digital signatures in e-mails.
• If in doubt, never disclose confidential information.
Industrial Security
78 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
Note
You should observe the following when you encounter suspicious e-mails:
• Be on your guard when you receive e-mails from someone you do not know, especially if the
e-mails include links and attachments. Never open suspicious attachments and do not click
on any links in the e-mail.
• Carefully check the sender’s complete e-mail address.
• Check the integrity of the links embedded in the e-mail (e.g. by moving the mouse over the
link). Tell-tale signs are spelling mistakes or where links contain a confusing company name.
• Use digital signatures in emails.
• If in doubt, never divulge any confidential information.
8.2.4 Control-related applications (In Machine, Industrial Edge for Machine Tools)
Overview
The Industrial Edge for Machine Tools is a remote-controlled Edge device that functions as a
field gateway as well as a computation node for any user workload within an extended IoT/OT
architecture. Thus, Industrial Edge for Machine Tools allows a vertical flow of information and
data processing between all layers:
• In Machine
• In Line
• In Cloud
This also contains the temporary or permanent saving of process data. Industrial Edge for
Machine Tools thus has the task, through its security architecture, of not allowing any
regression/erosion of the present network security and of the data protection level. In order
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 79
Product-specific security measures
8.2 CNC Shopfloor Management Software
to not cancel the individual security mechanisms of the Industrial Edge for Machine Tools,
organizational support is also needed here.
Industrial Security
80 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
'DWDIORZIURP,QGXVWULDO(GJHIRU0DFKLQH 'DWDIORZIURP0LQG6SKHUHWR
7RROVWR0LQG6SKHUH+7736#
,QWHUQHW
,QGXVWULDO(GJHIRU0DFKLQH7RROV
2QERDUGLQJLQIRUPDWLRQ +7736#LQLWLDWHGE\
8VDJHDQGELOOLQJGDWD
7/6
,QGXVWULDO(GJHIRU0DFKLQH7RROV
'HYLFHDQGDSSOLFDWLRQORJV &RQILJXUDWLRQGDWD
2SWLRQDO,R7GDWD )LUPZDUHDQGDSSOLFDWLRQV
2SWLRQDO
&RPSDQ\SUR[\LQFOILUHZDOO %URZVHU
PLQGVSKHUHLRDQG7&3SRUWPXVWEHUHOHDVHG GDWDEDVH
&RPSDQ\QHWZRUN
'DWDIORZIURP,QGXVWULDO(GJHIRU0DFKLQH
7RROVWRFRPSXWHUVLQWKHFRPSDQ\QHWZRUN
7/6
,R7GDWDYLDWKH23&8$VHUYHURIWKH
,QGXVWULDO(GJHIRU0DFKLQH7RROV
23&7&3#
,R7GDWDDQGZHEFRQWHQWYLDWKHUHYHUVH
SUR[\RIWKH,QGXVWULDO(GJHIRU0DFKLQH
7RROV+7736#
9SRZHUVXSSO\ 6,180(5,.1&8
;3
;3
0DFKLQHQHWZRUN
LQWKHFRQWUROFDELQHW
;
'DWDIORZEHWZHHQ,QGXVWULDO(GJHIRU
0DFKLQH7RROVDQGWKH1&8
'DWDIORZIURPWKH23&8$VHUYHUWR 1&SURJUDPVSURFHVVHGE\WKH,QGXVWULDO
,QGXVWULDO(GJHIRU0DFKLQH7RROV (GJHIRU0DFKLQH7RROV
,R7GDWD +)SUREHGDWDDQGKHDUWEHDWVLJQDO
,R7GDWD
6&$/$1&(
2SWLRQDO23&8$VHUYHU
'DWDIORZ
:LULQJ
)RUVHFXULW\UHDVRQVOLPLWLQJRIWKHGDWDIORZDQGFHUWLILFDWHEDVHGDXWKHQWLFDWLRQLVDFWLYH
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 81
Product-specific security measures
8.2 CNC Shopfloor Management Software
The Industrial Edge for Machine Tools is equipped with 2 physical network connections
(RJ45), which, according to the manual, are to be used for connecting to the In Machine and
In Line level. Ensure that the port assignment is correct due to the following reasons:
• The communication for the "In Machine" network is assumed to be unprotected for the most
part.
• No uncontrolled connectivity to higher-level networks (In Line, In Cloud) is possible for the
"In Machine" network.
Through a multi-level network architecture, the Industrial Edge for Machine Tools ensures the
isolation of both networks, which is only overcome by an application-defined flow of data.
Due to the use of container technology, there are additional mechanisms for isolating the
workload (Edge application) with regard to network, memory and CPU resources.
Communication of the Industrial Edge for Machine Tools in the direction of "In Cloud" and
"In Line" always takes place via an encrypted end-to-end channel (TLS 1.3). In addition,
communication of the Industrial Edge for Machine Tools with data bus is also protected
via an encrypted end-to-end channel (TLS 1.3). Supplemental to this, the integration into
a PKI-based trust chain is supported. This ensures both its restriction to only permitted
communication partners and a trustworthy transmission. For the in line exchange of data
in environments with special security requirements, client-based authorization via client
certificates is also possible.
The initial exchange of certificates needed for secure communication between the Edge
Management System (MindSphere / In Cloud) and Industrial Edge for Machine Tools (In Line)
takes place during what is known as the onboarding procedure. Onboarding includes the
exchange of a "shared secret", which connects a logical device (MindSphere asset) with a
physical device (Industrial Edge for Machine Tools). Since this exchange does not take place
via the same communication infrastructure, a compromise can be ruled out as early as
the onboarding procedure. A second aspect of the onboarding is the linking/integration of
the MindSphere IoT services (Timeseries Store, FileStore, Fleetmanager, etc.) in the correct
MindSphere tenants. The Industrial Edge for Machine Tools platform also ensures that no
data flow into a tenant or asset that is not defined for this purpose can be established at any
time.
Note
The requirement for using Industrial Edge for Machine Tools is a MindSphere tenant, including
a valid MindAccess account (at least IoT value plan S).
The Industrial Edge for Machine Tools communicates exclusively via "outgoing" connections.
This means that no exposition of the Industrial Edge for Machine Tools on the In Line or In
Cloud level is needed. Rather, this scenario is discouraged. Regardless of this configuration,
the accessibility of the MindSphere end points from Industrial Edge for Machine Tools
must be temporarily guaranteed. This concerns onboarding, the firmware update, or the (de)-
installation of Edge applications. The Industrial Edge for Machine Tools allows applications
(Industrial App) to not only provide data via a controlled path In Cloud, but these applications
also provide user interfaces and/or interfaces (APIs), to allow new workflows (In Line) or to
supplement existing ones. Under certain circumstances, applications provide their own user
and access management options for this purpose. The associated security information can be
found in the relevant documentation.
Communication of the Industrial Edge for Machine Tools with the SINUMERIK only takes
place via the "In Machine" network and is encrypted in accordance with the respective
Industrial Security
82 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
protocols. The authorization mechanisms vary depending on the protocol used, however.
Since some protocols are protected using weak protection mechanisms, it is important in
such cases to adhere to adequate password guidelines and to ensure within an organization
that passwords are never saved or are only saved in urgent cases.
The Industrial Edge for Machine Tools is also protected against unwanted manipulation
or weakening of the security features on both the firmware and application levels by the
following features:
• Measured / Secured Boot
• Full Disk Encryption
• Rootless Access
To ensure a high level of security of the Industrial Edge for Machine Tools over a long period
of time, the firmware is continuously being further developed and hardened. This is required
to adapt to the ever intensifying cyber security threat situation. For this purpose, an update
mechanism is available as part of the Industrial Edge for Machine Tools firmware, which is
integrated into the corresponding IT process as part of a continuous security strategy.
Note
Industrial Edge for Machine Tools Version 3.4.0 and higher provides MQTT with authentication
functions.
Note
A subscription for the "AmazonIpSpaceChanged" topic can be used to provide notification as to
when changes are made to the IP address ranges so that firewall rule sets can be automatically
updated: AmazonIpSpaceChanged (https://aws.amazon.com/blogs/aws/subscribe-to-aws-
public-ip-address-changes-via-amazon-sns/).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 83
Product-specific security measures
8.2 CNC Shopfloor Management Software
8.2.4.2 Analyze MyWorkpiece /Monitor
Overview
Analyze MyWorkpiece /Monitor is an "Industrial Edge for Machine Tools" application for
qualitative monitoring and evaluation of the machining process. For this purpose, various
measured values are stored during machining.
Industrial Security
84 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
Overview
Analyze MyMachine /Condition is an application that analyzes and tracks the status of your
machine. Specific mechatronic tests as well as data analytical methods are used for this purpose.
The hybrid application consists of an Industrial Edge for Machine Tools and a MindSphere
application.
The following user groups are available for the MindSphere application:
• Standard user: ammcondition
• Administrator: ammcondition
You can edit users and roles in the MindSphere application "MindSphere settings". More
information can be found at: MindSphere documentation (https://siemens.mindsphere.io/en/
docs/mindaccess.html)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 85
Product-specific security measures
8.2 CNC Shopfloor Management Software
Overview
Protect MyMachine /3D Twin visually represents the machining process and machine
movements using 3D simulation, calculates possible collisions in advance, and stops machining
when they are detected. For example, you can simulate and monitor the execution of NC
programs in AUTOMATIC mode, MDI mode or during manual traverse movements and tool
changes in JOG mode. Collision avoidance is based on a machine model of the real machine. This
model also describes the protection areas of the machine and is provided by the machine
manufacturer.
As an operator in PMM /3D Twin, you define the variable protection areas such as tools
with holders, stock and clamping operations. These are stored in a library. The "Collision
Avoidance" function regularly calculates the clearance with respect to protection areas from
collision pairs. If two protected areas approach each other and a defined safety distance is
reached, an alarm is displayed and the program is stopped before the corresponding traverse
block and/or traverse motion is stopped.
Industrial Security
86 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.2 CNC Shopfloor Management Software
Security disclaimer
The transport of exported files must be secured by technical means such as encrypted/signed
emails, encrypted/signed USB flash drives, etc., especially in public environments and on the
Internet.
Exported data files must be stored within the OEM end user area with restricted
access (e.g. restricted access to SharePoint, databases, etc.) by user administration,
e.g. with login information (see also security notes Using SINUMERIK Industrial
Edge for Machine Tools Protect MyMachine /3D Twin Operating Manual (https://
support.industry.siemens.com/cs/ww/en/view/109805644)).
The customer is responsible for secure communication between SINUMERIK and the Edge
Box. Options for maintaining a secure connection include:
• Point-to-point connection between and SINUMERIK and the Edge Box. Use of a short
communication line and device placement in the same cabinet as SINUMERIK.
• Protection of the logical and physical access points of the SINUMERIK system
Data backup
For data backup or transfer between machine projects, you can export and import "*.zip"
archives into the 3D simulation. You export/import the archive in the "Settings" tab.
The archive contains the following data:
• All library components (e.g. stocks, tool components)
• Tool data (tools with defined protected areas)
• Machine model
• Settings (holder diameter, language)
Note
You can export/import archives only when 3D simulation is not active.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 87
Product-specific security measures
8.3 SIMOTION
8.3 SIMOTION
Security functions
• There is only compiled code on the controller by default. For this reason, no upload and
consequently no re-engineering is possible.
• No modifications can be made to the configuration without the matching engineering
project.
• Know-how protection for source programs with password and encryption.
• Applicative copy protection for the configuration on the control system
• Detection of source code manipulation with the SIMOTION SCOUT engineering system.
• Activating/deactivating unused functions (web server, OPC UA server, ports, etc.)
• Use of the SIMATIC Logon for access to a project only with the appropriate rights.
• Virus scan and security updates for SIMOTION PC-based controllers (SIMOTION P).
A production plant is typically divided into several different network segments. These
"segments" are components that have the required security functions connected upstream.
They are shown with a padlock symbol in the overview graphic.
Operations level
PCS7 PCS7
WinCC WinCC UMTS
Softnet Securtiy
Internet
Client/Step 7…
Scalance
S623
Scalance XR324-12M DSL Modem Scalance M875
SIMATIC S7 SIMATIC S7
SIMATIC S7-1200
HMI HMI
Field level
Figure 8-5 Display of a typical production plant with protected areas
Industrial Security
88 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
Reference
Detailed descriptions and further procedures can be found in the corresponding SIMOTION
documentation.
Many products (SINUMERIK, SIMOTION, SINAMICS) contain OpenSSL. The following applies to
these products:
• This product contains software (https://www.openssl.org/) that has been developed by the
OpenSSL project for use in the OpenSSL toolkit.
• This product contains cryptographic software (mailto:eay@cryptsoft.com) created by Eric
Young.
• This product contains software (mailto:eay@cryptsoft.com) developed by Eric Young.
Note
A SIMOTION device can no longer be accessed via a deactivated PROFINET interface hardware
port.
The engineering system and the PN stack ensure that at least one port on each interface is
not set to Disable to prevent users locking themselves out. The default setting is Automatic
settings.
Further information
Further information on the logical Ethernet ports and protocols used for SIMOTION can be found
in the Communication with SIMOTION System Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801516), Chapter "Services used".
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 89
Product-specific security measures
8.3 SIMOTION
Note
Because of the resulting performance impairments, the installation and use of a standard virus
scanner on a SIMOTION P320 during system runtime is not permitted.
Note
FAQ Service & Support portal
More information on using a virus scanner on a SIMOTION P320 can be found in the FAQ "How
can a virus scanner be used on a SIMOTION P3x0?" (https://
support.automation.siemens.com/WW/view/en/59381507) which is available as a download
from the Service & Support portal.
Industrial Security
90 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
File structure
The SIMOTION SCOUT project data can come in the following formats:
Engineering data (ES)
• Standard storage: File structure in the project tree
STEP 7/TIA Portal and SIMOTION SCOUT objects in the project directory. These objects are not
secure and can be edited by anyone if there is no know-how protection for programs and
libraries or external file encryption is used. Programs in this context programs are
synonymous with units, which can contain the programs, function blocks and functions.
• XML data
Project data created via an XML export/import. The know-how protection is retained.
Runtime data (RT) - data on the CF card
• ZIP archive of the SIMOTION project (not binary).
The project archive is stored on the memory card of the respective SIMOTION controller
(CFAST, CF card, MMC). The archive can be transferred, e.g. via SIMOTION SCOUT or using
standard methods (FTP transfer).
• Binaries (zipped, unzipped)
Binaries contain the compiled, executable project with the configurations and applications.
Changes cannot be made during runtime without the SIMOTION SCOUT project because the
project is stored as binary data on the SIMOTION controller.
The following figure shows an example of possible project data storage with display of the
protected data.
ZIP archive
XML file
Encrypted programs,
Compiled in binary form, libraries and password-
cannot be decompiled protected modules
without the project
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 91
Product-specific security measures
8.3 SIMOTION
Change log
A change log can be recorded when the access protection is activated. This includes, for
example:
• Activation
• Deactivation
• Configuration of access protection and the change log
• Opening and closing of projects and libraries including their download to the target system
as well as activities to change the operating state
Industrial Security
92 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
You can select three different security levels for the encryption:
• Standard
Access only with user login and password (backward compatible with versions before V4.2).
• Medium
Improved coding of the password (due to a new procedure, no backward compatibility
without knowledge of the password).
Programs and libraries can be recompiled at any time even without knowledge of the
password.
• High (only for ST source files in libraries)
Compilation is only possible after the password has been entered.
Protected libraries can also be used after an export without knowledge of the password,
because in this case the compilation result is also exported.
– An export without source texts is also possible when exporting libraries
Highest protection. Complete removal of the source texts in the engineering upon export.
The export only contains the compilation result (recompilation no longer possible).
The block interfaces are always visible.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 93
Product-specific security measures
8.3 SIMOTION
has a specific machine key which is generated by the machine manufacturer and stored in
the application, and which can be entered by the end customer, for example, via the HMI,
particularly during maintenance work.
In addition, special agreements can also be made regarding extended know-how protection
and copy protection through the use of a SIMOTION Open Architecture technology package.
Project comparison
You can use the SIMOTION SCOUT/STARTER Project comparison function (start this via the Start
object comparison button) to compare objects within the same project and/or objects from
different projects (online or offline).
The offline/online comparison is used to detect in detail any subsequent manipulations of the
project data on the plant in comparison to your secured engineering data. Thus you check if
any unauthorized third parties accessed the system.
The following comparisons are possible:
• Offline object with offline object from the same project
• Offline object with offline object from a different project
• Offline object with online object
The project comparison in SIMOTION SCOUT contains all objects in a project, such as
SIMOTION devices, drive units, libraries, programs (units), technology objects, I/Os as well
as the configuration of the execution system.
The offline/online comparison provides support for service jobs or for detecting changes to
the project data.
It may, for example, be the case that inconsistencies are indicated when you switch to online
mode in the project navigator, i.e. there are deviations between your project in SIMOTION
SCOUT and the project loaded into the target system.
Industrial Security
94 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 95
Product-specific security measures
8.3 SIMOTION
Introduction
SIMOTION devices provide a Web server with preprepared standard websites. These websites
can be displayed via Ethernet using a commercially available browser. Additionally, you have the
option of creating your own HTML websites and incorporating service and diagnostic
information. The web server can be deactivated. If the Web server is active, secure operation of
the plant can be ensured via the integrated security concept and the user administration.
Figure 8-9 Activating the SIMOTION IT Web server functions in SIMOTION SCOUT or SIMOTION SCOUT TIA
Note
To activate the Web server, you must establish a user administration scheme with password-
protected user access.
Security concept of HTTP/S, FTP and Telnet access on the Web server
As of version V4.4, access to the SIMOTION IT Web server is protected by a multi-level security
concept.
The security status of the Web server is indicated by the security level on the website. This
security level can have three different levels: Low, Normal, High
Industrial Security
96 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
User management
SIMOTION IT uses a user database to safeguard access to a device. The groups are stored in the
user database along with their assigned users. The defined user groups can be assigned access
rights to the individual Web server websites. The Web server is accessed after the
authentication.
Authentication
• There are users (USERs).
• Each user has a password. This is encrypted.
• Users belong to groups (GROUP).
• Websites, directories, and applications are protected by secure areas defined for each group.
• Only users that belong to the secure area can access the protected website.
• Each secure area has a group of users who have access authorization.
• A user can belong to different groups.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 97
Product-specific security measures
8.3 SIMOTION
Key files
• Delivery state
In order for you to be able to access the SIMOTION controller via the SIMOTION IT diagnostics
standard websites (in their delivery state) via HTTPS, a root certificate and a private key are
supplied as a file on the device.
• Creating the TLS certificate yourself
Using the Perl Tool and the Perl Script (cert.pl) provided, the certificates required for customer
facilities (sites) can be generated and combined to form packages that can be loaded.
There are two ways of acquiring your own server certificate (TLS certificate):
• Create a root certificate (self-signed) and a private key using a certificate software.
• Purchase a server certificate from a certificate authority.
Further information
Further information on the SIMOTION IT web server can be found in the following
documentation:
• SIMOTION IT Diagnostics and Configuration Diagnostics Manual (https://
support.industry.siemens.com/cs/de/en/view/109767636)
• SIMOTION IT OPC UA Programming Manual (https://support.industry.siemens.com/cs/de/en/
view/109767638)
• SIMOTION IT Programming and Web Services Programming Manual (https://
support.industry.siemens.com/cs/ae/en/view/109801546)
• SIMOTION IT Virtual Machine and Servlets Programming Manual (https://
support.industry.siemens.com/cs/de/en/view/109767639)
Industrial Security
98 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.3 SIMOTION
Introduction
SIMOTION has implemented an OPC UA server with DA (Data Access).
OPC UA binary encoding is supported. Access to an arbitrary OPC UA client can be protected
via authentication and encrypted data transfer.
Configuration
Note
Before connecting to the OPC UA server, ensure that the environment is secure and install a
hardware-based intermediate layer (e.g. DMZ network, firewall, SCALANCE S modules, etc.).
The OPC UA server can be activated or deactivated via HW Config from TIA Portal or STEP 7.
Figure 8-10 Activating the SIMOTION IT Web server functions in SIMOTION SCOUT or SIMOTION SCOUT TIA
Further settings are made via the SIMOTION IT Web server configuration masks:
• Enabling of the Ethernet interface and associated port of SIMOTION for the OPC UA access.
• Definition of the user name, password and user group as part of the user administration of
the SIMOTION IT Web server.
• Handling of the certificates for the encryption of the data transfer.
Further information
Further information on the OPC UA server can be found in the SIMOTION IT OPC UA
Programming Manual (https://support.industry.siemens.com/cs/ww/en/view/109801547).
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 99
Product-specific security measures
8.3 SIMOTION
8.3.7 Disposal
NOTICE
Data misuse
Unsafe disposal of the storage media (CF card/CFast/SSD) can lead to misuse of the data of the
part programs, archives, etc. by third parties.
• Therefore, ensure that the data on the storage media that is used is securely deleted before
disposing of the product.
Use programs that support you in securely deleting/formatting storage media.
Industrial Security
100 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
8.4 SINAMICS
The following chapter provides you with an overview of the Industrial Security features available
for SINAMICS to protect your converters from threats. In the following, you will find topics which
you should pay special attention to regarding Industrial Security:
• Write and know-how protection
• Parameters: Access levels
• Using the memory card
• Note on Safety Integrated
• Communication services and used port numbers
• Web server
• Information about individual interfaces
• SINAMICS Startdrive and STARTER
• SINAMICS Drive Control Chart (DCC)
Detailed descriptions and procedures can be found in the corresponding SINAMICS
documentation.
Many products (SINUMERIK, SIMOTION, SINAMICS) contain OpenSSL. The following applies to
these products:
• This product contains software (https://www.openssl.org/) that has been developed by the
OpenSSL project for use in the OpenSSL toolkit.
• This product contains cryptographic software (mailto:eay@cryptsoft.com) created by Eric
Young.
• This product contains software (mailto:eay@cryptsoft.com) developed by Eric Young.
Note
SINAMICS products may only be used in a secure and trusted network. Observe the information
on this topic in Chapter "Network segmentation (Page 38)".
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 101
Product-specific security measures
8.4 SINAMICS
Effect
Adjustable parameters which are not recorded in an exception list can neither be read nor
written.
Exceptions
• The know-how protection does not affect parameters that are provided with the following attributes:
• KHP_WRITE_NO_LOCK
– These parameters are excepted from the know-how protection and can therefore be written to despite
the know-how protection.
– For a list of these parameters, see the List Manual of the respective product.
– These parameters are not included in the exception list.
• KHP_ACTIVE_READ
– These parameters can also be read, but not written, with activated know-how protection.
– For a list of these parameters, see the List Manual of the respective product.
– These parameters are not included in the exception list.
• Know-how protection does not prevent the execution of certain functions:
• In particular, the "Restore factory settings" function is still possible despite know-how protection.
• For a full list of executable functions, please refer to the following references.
Further information
For more information on this topic, see the following references:
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/de/en/view/109771805)
Chapter "Know-how protection"
• SINAMICS G110M operating instructions (https://support.industry.siemens.com/cs/de/en/
view/109757594)
Chapter "Know-how protection"
• SINAMICS G120 Operating Instructions
Chapter "Know-how protection"
• SINAMICS S and SINAMICS G List Manuals
Section "Parameters for write protection and know-how protection"
• SINAMICS G130, G150 and S150 Operating Instructions
Chapter "Know-how protection"
Industrial Security
102 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
Further information
For detailed information on this topic, see the following references:
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/de/en/view/109771805)
Chapter "Parameters"
• SINAMICS S120 Safety Integrated Function Manual (https://
support.industry.siemens.com/cs/de/en/view/109771806)
Section "Handling the safety password"
• SINAMICS G110M List Manual
Chapter "Overview of parameters"
• SINAMICS G120 Operating Instructions
Chapter "Parameters"
• SINAMICS S and SINAMICS G List Manuals
Section "Explanation of the list of parameters"
• SINAMICS G130, G150 and S150 Operating Instructions
Chapter "Parameters"
WARNING
Risk of death due to software manipulation when using exchangeable storage media
Storing files onto exchangeable storage media amounts to an increased risk of infection of the
commissioning PCs, e.g. with viruses or malware. Incorrect parameter assignment can cause
machines to malfunction, which can lead to injuries or death.
• Protect files stored on exchangeable storage media from malicious software using
appropriate protection measures, e.g. virus scanners.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 103
Product-specific security measures
8.4 SINAMICS
WARNING
Risk of death due to software manipulation when using exchangeable storage media
Storing the parameterization (incl. Safety Integrated parameterization) on exchangeable
storage media carries the risk that the original parameterization (with Safety Integrated) will be
overwritten, for example, by the memory card of another drive without Safety Integrated.
Incorrect parameter assignment can cause machines to malfunction, which can lead to injuries
or death.
• Ensure that only the memory card that belongs to the respective inverter is used.
• Ensure that only trained or authorized personnel have access to the enclosures, cabinets or
electrical equipment rooms.
DANGER
Unexpected movement of machines caused by inactive safety functions
Inactive or non-adapted safety functions can trigger unexpected machine movements that
may result in serious injury or death.
• Observe the information in the appropriate product documentation before commissioning.
• Carry out a safety inspection for functions relevant to safety on the entire system, including
all safety-related components.
• Ensure that the safety functions used in your drives and automation tasks are adjusted and
activated through appropriate parameterizing.
• Perform a function test.
• Only put your plant into live operation once you have guaranteed that the functions
relevant to safety are running correctly.
Note
Important safety notices for Safety Integrated functions
If you want to use Safety Integrated functions, you must observe the safety instructions in the
Safety Integrated manuals.
Industrial Security
104 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
Webserver/Startdrive
The "Back up and restore" function provides you with the following options:
• Backing up parameters that have already been set
• Assigning a name to the backup file
• Restoring parameters from a valid parameter backup and loading them to the drive
• Restore drive factory settings
More information
For detailed information on this topic, see the following references.
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/ww/en/view/109781535)
Chapter "Web server"
• SINAMICS S120 Commissioning Manual with Startdrive (https://
support.industry.siemens.com/cs/ww/de/view/109781583/en)
Chapter "Saving settings on the memory card of the drive"
• SINAMICS S210 Operating Instructions (https://support.industry.siemens.com/cs/ww/en/
view/109771824)
Chapter "Backup and restore"
• SINAMICS G120 Operating Instructions "SINAMICS G120 Smart Access" (https://
support.industry.siemens.com/cs/ww/en/view/109771299)
Chapter "Backup and restore"
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 105
Product-specific security measures
8.4 SINAMICS
SINAMICS S120
In conjunction with the "Firmware update via the web server" and the associated remote access,
the "Redundant data backup on a memory card" provides safe access again to the device in the
event of an interruption of the connection or the power supply. This redundant data backup
cannot be deactivated.
8.4.6.3 Redundant_backup_more_info
More information
For detailed information on this topic, see the following references.
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/ww/en/view/109781535)
Chapter "Redundant data backup on a memory card"
• SINAMICS S120 Commissioning Manual with Startdrive (https://
support.industry.siemens.com/cs/ww/de/view/109781583/en)
Chapter "Saving settings on the memory card of the drive"
• SINAMICS S210 Operating Instructions (https://support.industry.siemens.com/cs/ww/en/
view/109771824)
Chapter "Backup and restore"
• SINAMICS G Operating Instructions
Industrial Security
106 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
The SINAMICS web server provides information on a SINAMICS device via its websites. This is
accessed via an Internet browser.
Data transfer
In addition to the normal (unsecured) transmission (http), the Web server also supports secure
transmission (HTTPS). Secure transmission (HTTPS) is the recommended setting.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 107
Product-specific security measures
8.4 SINAMICS
Note
Smart Access Module
The web server of the Smart Access Module does not support secure transmission (HTTPS).
Alternatively, you can use an encrypted WLAN transmission.
By entering "HTTP://" or "HTTPS://" in front of the address of the drive, you can decide yourself
whether normal or secure transmission is used to access the data.
For safety reasons, secure transmission can be forced by deactivation of the http port.
Access rights
The normal protection mechanisms of SINAMICS also apply for access via the web server,
including password protection. Further protective mechanisms have been implemented
especially for the Web server. Different access options have been set for different users,
depending on the function. The parameter lists are protected so that only users with the
appropriate rights can access or change the data.
Further information
For detailed information on this topic (e.g. the supported Internet browsers), see the following
references:
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/ww/en/view/109781535)
Section "Web server"
• SINAMICS S210 Operating Instructions (https://support.industry.siemens.com/cs/ww/en/
view/109771824)
• SINAMICS V20 Operating Instructions (https://support.industry.siemens.com/cs/de/de/view/
109768394/en)
• SINAMICS G120 Smart Access Operating Instructions (https://
support.industry.siemens.com/cs/ww/en/view/109771299)
• SINAMICS G130, G150 and S150 Operating Instructions
Industrial Security
108 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
TLS
Transport Layer Security (TLS V1.2 or higher) is a hybrid encryption protocol for secure transfer
of data in the Internet.
Key files
You need 2 key files (a public certificate and a private key) for the encryption method used by the
Transport Layer Security.
Certificate handling
The necessary certificate and key is generated on the drive so that you can access the drive
via HTTPS in the SINAMICS as delivered. For this reason, the firmware certificate should
only be used in secure networks (e.g. PROFINET below a PLC) or for direct point-to-point
connections on the service interface X127.
Instead, use a certificate confirmed by an external certification center. The references cited in
the following contain a detailed description of the procedure.
Further information
For detailed information on this topic, see the following references:
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/de/en/view/109771805)
Section "Certificates for the secure data transfer"
• SINAMICS G130, G150 and S150 Operating Instructions
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 109
Product-specific security measures
8.4 SINAMICS
NOTICE
Access to the inverters only for authorized personnel
Unauthorized persons may be able to damage or alter production equipment as a result of gaps
in a company's physical security. Confidential information can also be lost or altered as a result
of this. You can prevent this if you protect the company site and the production areas
accordingly.
• You can find information on suitable protective measures in Section "Physical protection of
critical production areas (Page 36)".
Further information
For detailed information on this topic, see the following references:
• SINAMICS S120
– SINAMICS S120 Control Units and Additional System Components Equipment Manual
(https://support.industry.siemens.com/cs/de/en/view/109771804)
Section on the respective interfaces
– Starting from firmware Version 5.2: SINAMICS S120 Communication Function Manual
(https://support.industry.siemens.com/cs/ww/en/view/109771803)
– Older firmware versions:
SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/de/en/view/109771805)
• SINAMICS G and SINAMICS S Operating Instructions
• SINAMICS V90 Operating Instructions
Industrial Security
110 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
8.4.11 Disposal
NOTICE
Data misuse resulting from unsafe disposal of the product
Unsafe disposal of the product can lead to misuse of the parameter data by third parties.
• Therefore, before disposal, restore all the parameters to the factory settings.
You can find further information on restoring the factory settings in the Function Manual or
Operating Instructions of the respective product.
NOTICE
Data misuse resulting from unsafe disposal of the memory card
Unsafe disposal of the memory card can lead to misuse of the data etc. by third parties. Among
other things, the data backups required for operating the converter are located on the memory
card.
• Therefore, ensure that the data on the memory card is securely deleted before disposing of
the product. There are programs that support you in securely deleting/formatting the
memory card.
• This concerns all products that have a memory card.
Note
Deleting user-defined certificates
Make sure you securely remove all user-defined certificates before disposing of a SINAMICS
product. A hacker can use your certificates to gain access to your protected data transmission.
• Products with memory card
– Delete the files SINAMICS.key and SINAMICS.crt from the directory
OEM\SINAMICS\WEB\WEBCONF\CERT on the memory card.
• Products with optional memory card (e.g. SINAMICS S210)
– Create empty files ("SINAMICS.key" and "SINAMICS.crt") with the corresponding file
names.
– Copy these files to the memory card.
– Insert the memory card into the converter.
– Restart the converter.
– Alternatively, when you no longer need data from the memory card: reformat the
memory card.
You can find further information in the Function Manual or Operating Instructions of the
respective product.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 111
Product-specific security measures
8.4 SINAMICS
WARNING
Malfunctions of the machine as a result of incorrect or changed parameterization
As a result of incorrect or changed parameterization, machines can malfunction, which in turn
can lead to injuries or death.
• Protect the parameter settings against unauthorized access.
• Respond to possible malfunctions by applying suitable measures (e.g. EMERGENCY STOP or
EMERGENCY OFF).
Commissioning computer
Ensure the security of the commissioning computer. Follow the general security measures
(Page 33) for this purpose.
Security functions
• Activation/deactivation of unused functions (web server, ports)
• Write protection for the parameter assignment, p-parameters are readable, but not
writeable, protects against unintentional changes to the parameter assignment (only
available online).
Industrial Security
112 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
Scripting (Openness)
Scripts (Openness) are used for automating sequences in Startdrive. You must therefore test the
scripts before using them on machines.
WARNING
Risk due to incorrect configurations for automated operating actions
Scripting provides the extensive automation options that are required to be able to automate
manual operator actions in the Startdrive tools and therefore to optimize the time required for
the recurring configuration of projects and tasks.
The script programmer and the script user are responsible for the operator actions
implemented in scripting.
Incorrect configurations that are not discovered in tests can result in serious physical injury or
death.
• Run systematic tests on new and modified scripts to verify and validate them.
• Before running a script, make sure it has the correct content. Verify and validate the results
of script execution by tests on the machine.
Commissioning computer
Ensure the security of the commissioning computer. Follow the general security measures
(Page 33) for this purpose.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 113
Product-specific security measures
8.4 SINAMICS
Security functions
• Know-how protection for the parameter assignment, scripts and DCCs and DCC libraries with
password and encryption
• Copy protection for the configuration on the drive unit. The project can only be opened
together with the original card.
• Detection of parameter manipulation with STARTER via the project comparison, see also
"Offline/online comparison (Page 94)"
• Activation/deactivation of unused functions (web server, ports), see also "Integrated web
server (Page 107)"
• Write protection for the parameter assignment, p-parameters are readable, but not
writeable, protects against unintentional changes to the parameter assignment (only
available online).
Scripting
Scripts are used for automated execution in STARTER. You must therefore test the scripts before
using them on machines.
WARNING
Risk due to incorrect configurations for automated operating actions
Scripting provides the extensive automation options that are required to be able to automate
manual operator actions in the STARTER/SCOUT tools and therefore to optimize the time
required for the recurring configuration of projects and tasks.
The script programmer and the script user are responsible for the operator actions
implemented in scripting.
Incorrect configurations that are not discovered in tests can result in serious physical injury or
death.
• Run systematic tests on new and modified scripts to verify and validate them.
• Before running a script, make sure it has the correct content. Verify and validate the results
of script execution by tests on the machine.
As for DCC charts, scripts can also be protected via know-how protection.
Industrial Security
114 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
Overview
SINAMICS Drive Control Chart (DCC) offers a modular, scalable technology option, which has
chiefly been developed for drive-related, continuous open-loop and closed-loop control
engineering tasks within the drive.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 115
Product-specific security measures
8.4 SINAMICS
With the Drive Control Chart Editor based on CFC, you configure the technology functions
with DCC for SINAMICS drives graphically.
• Startdrive
The following figure shows the data flow of the configuration data when configuring with
SINAMICS DCC:
7,$3RUWDO
/LEUDULHV
08/
① Loading
② Import of DCB libraries
Figure 8-11 Flow of configuration data: TIA-DCC
• STARTER
The following figure illustrates the data flow of the configuration data when configuring with
SINAMICS DCC and the ways to protect the configured/programmed DCC sources:
Industrial Security
116 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
'&&&)&
$GG
0XO
&RQILJXULQJ &RPSLOLQJ
%DFNXSLQWKHILOHV\VWHP
67$57(5FKDUWVDQGOLEUDULHV
%ORFNW\SHLPSRUW /RDGLQJ
'&%OLEUDU\6,1$0,&6
6,1$0,&6
'&&OLEUDU\6,1$0,&6
'&&
Figure 8-12 Flow of configuration data: Example for DCC Classic V2.1 ... V3.4 (STARTER)
Commissioning computer
Ensure the security of the commissioning computer. Follow the general security measures
(Page 33) for this purpose.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 117
Product-specific security measures
8.4 SINAMICS
WARNING
Danger to life through manipulation of DCC charts and DCC libraries
The use of unprotected DCC charts and DCC libraries entails a higher risk of manipulation of
DCCs, DCC libraries and backup files.
• Protect important DCC charts and DCC libraries via "Know-how protection programs" or
"Know-how protection drive units" in SCOUT or STARTER. Assign a strong password to
prevent manipulation.
• Protect important DCC charts and DCC libraries via "Know-how protection drive units" in
Startdrive V16 or higher. Assign a strong password to prevent manipulation.
• Therefore, for "Know-how protection programs" or "Know-how protection drive units", use
passwords which include at least eight characters, upper and lower case letters, numbers,
and special characters.
• Make sure that only authorized personnel can access the passwords.
• Protect the backup files on your file system using a write protection.
The optional Smart Access Module offers you an intelligent solution for commissioning the
SINAMICS V20 or G120 converter.
Industrial Security
118 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Product-specific security measures
8.4 SINAMICS
The Smart Access Module is a web server module with integrated WLAN connectivity. It
allows web-based access to the converter from a connected device (conventional PC with
WLAN adapter, tablet or smartphone). This module is only intended for commissioning and
therefore cannot be used with the converter for the long term.
NOTICE
WLAN: Changing a default password
The misuse of passwords can also represent a considerable security risk. As a result of incorrect
or changed parameterization, machines can malfunction, which in turn can lead to injuries or
death.
• After logging on to the Smart Access Module for the first time, change the module's default
password.
• Assign a secure password. Information on this can be found in the Operating Instructions of
the respective converter.
NOTICE
Unauthorized access to the converter via the SINAMICS Smart Access Module
Unauthorized access to the converter via the Smart Access Module as a result of cyber attacks
could lead to interruptions in the process and thus to property damage or personal injury.
• Before you log in to the web pages, check the status LED on the Smart Access Module. If the
status LED is green or flashing, unauthorized access could have occurred: Switch the
SINAMICS Smart Access Module off and then on again using the on-off switch to re-establish
the WLAN connection.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 119
Product-specific security measures
8.5 SIMOCRANE
8.5 SIMOCRANE
Availability, productivity, and safety are the decisive factors in crane applications. Since
SIMOCRANE products are based on products from SIMOTION and SINAMICS, observe the
product-specific hardening measures in Chapters SIMOTION (Page 88) and SINAMICS
(Page 101) for hardening.
Industrial Security
120 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
References A
General information
Additional general information about Industrial Security is available on the Internet:
• Industrial security (https://www.siemens.com/industrialsecurity)
• Cyber security (https://new.siemens.com/global/en/company/topic-areas/
cybersecurity.html)
• Industrial Cybersecurity (https://new.siemens.com/global/en/products/automation/topic-
areas/industrial-security/planning.html)
• Secure Digitalization (https://new.siemens.com/global/en/products/automation/topic-areas/
industrial-security/certification-standards.html#Alwaysactive)
• Certifications and standards (https://new.siemens.com/global/en/products/automation/
topic-areas/industrial-security/certification-standards.html)
• Whitepapers and downloads (https://new.siemens.com/global/en/products/automation/
topic-areas/industrial-security/downloads.html)
Secure passwords
More information on assigning secure passwords can be found in the chapter under the
following addresses:
• European Network and Information Security Agency (enisa). (https://www.enisa.europa.eu/
media/news-items/basic-security-practices-regarding-passwords-and-online-identities)
• National Institute of Standards and Technology (NIST) (https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-63b.pdf)
• Federal Office for Information Security (BSI) (https://www.bsi.bund.de/EN/Themen/
Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Cyber-
Sicherheitsempfehlungen/Accountschutz/Sichere-Passwoerter-erstellen/sichere-
passwoerter-erstellen_node.html)(only relevant for Germany)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 121
References
Product-specific manuals
Product-specific manuals for the individual products can be found on the Internet:
• "SINUMERIK 840D sl NCU 7x0.3 PN" Manual (https://
support.industry.siemens.com/cs/ww/en/view/109782727)
• "Commissioning CNC: NC, PLC, Drive" Commissioning Manual (https://
support.industry.siemens.com/cs/ww/en/view/109777906)
• "SINUMERIK 840D sl Operating System NCU (IM7)" Commissioning Manual (https://
support.industry.siemens.com/cs/ww/en/view/109783230)
• "SINUMERIK 840D sl Base Software and HMI sl" Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109254363)
• SINUMERIK 840Dsl Safety Integrated plus Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109777982)
• "SINUMERIK Operate (IM9)" Commissioning Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801207)
• PCU-Basesoftware (IM8) Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109748542)
• "PCU Base Software (IM10)" Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109769185)
• SINUMERIK Access MyMachine /P2P (PC) Operating Manual (https://
support.industry.siemens.com/cs/ww/en/view/109770206)
• SINUMERIK Access MyMachine /OPC UA Configuration Manual (https://
support.industry.siemens.com/cs/de/en/view/109777871)
• Manage MyMachines /Remote Function Manual (https://
support.industry.siemens.com/cs/ww/en/view/109759394)
• Diagnostics Manual 808D (https://support.industry.siemens.com/cs/de/en/view/
109763685)
• SIMOTION IT Programming and Web Services Programming Manual (https://
support.industry.siemens.com/cs/de/en/view/109767637)
• SIMOTION IT Diagnostics and Configuration Diagnostics Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801545)
• SIMOTION IT Virtual Machine and Servlets Programming Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801548)
• SIMOTION IT OPC UA Programming Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801547)
• BA_G110M (https://support.industry.siemens.com/cs/ww/en/view/109782996)
• Communication with SIMOTION System Manual (https://
support.industry.siemens.com/cs/ww/en/view/109801516)
• SINAMICS S120 Drive Functions Function Manual (https://
support.industry.siemens.com/cs/ww/en/view/109781535)
• SINAMICS S120 Control Units and Additional System Components Equipment Manual
(https://support.industry.siemens.com/cs/ww/en/view/109782370)
Industrial Security
122 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
References
See also
Safety Integrated plus Commissioning Manual (https://
support.industry.siemens.com/cs/de/en/view/109763246)
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 123
References
Industrial Security
124 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Glossary
Allow-List
An Allow-List or Block-List involves a positive or negative list that can be used to protect
systems in the IT environment. Allow-List and Block-List apply opposing strategies and are
used in the widest range of domains.
The Allow-List is based on the approach that basically everything that is not explicitly entered
in the list is prohibited. As a consequence, only requested and trustworthy entries are in the
Allow-List. This means that the entries in the list represent exceptions to the general block
rule.
AMC
Abbreviation for SINUMERIK Integrate Analyze MyCondition
AMD
Abbreviation for SINUMERIK Integrate Access MyData
AMM
Abbreviation for SINUMERIK Integrate Access MyMachine
AMP
Abbreviation for SINUMERIK Integrate Analyze MyPerformance
AMT
Abbreviation for Intel® Active Management Technology
Area of attack
The scope to which a system can be deprived of its protection so that it can be attacked.
Attack
An attempt to destroy a resource, to deprive it of its protection, to change it, to deactivate it,
to steal it, to gain unauthorized access to it or to use it in an illegal way.
Authentication
Verification of the identity of a user, process or device, frequently as prerequisite for the
permission to access resources in an information system.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 125
Glossary
Authorization
The right granted by a system entity to access a system resource.
Availability
Property to be accessible and usable when requested by an authorized entity.
Block-List
An Allow-List or Block-List involves a positive or negative list that can be used to protect
systems in the IT environment. Allow-List and Block-List apply opposing strategies and are
used in the widest range of domains.
With a Block-List, everything is permitted that is not in the list. The Block-List is a negative
list, which lists the targets, programs and addresses that are not trusted or are not
permissible. With the negative list, it is possible to specifically prohibit individual applications
or communication targets.
Brute force
There are no efficient algorithms for solving many of the problems in computer science.
The most natural and simplest approach to an algorithmic solution for a problem is to
simply try out all possible solutions until the correct one is found. This method is called
brute-force searching. One typical application is given again and again when it comes to
listing an example of brute-force searching - the "cracking" of passwords. Passwords are often
encrypted using cryptographic hash functions. Directly calculating the password from the
hash value is practically impossible. However, a password cracker can calculate the hash
values of numerous passwords. If a value matches the value of the stored password, then
the password (or another, randomly matching password) has been found. In this case, brute
force refers to the simple trial and error approach of entering every possible password.
Cloud computing
Cloud computing is the storage of data in a remote data center, and can also involve
the execution of programs that are not installed on local computers, but rather in the
(metaphoric) cloud.
Code injection
Code injection is the exploitation of a computer error caused by processing invalid data.
Injection is used by an attacker to inject code into a vulnerable computer program and cause
it to execute.
Confidentiality
Property which ensures that the information is not made available or disclosed to
unauthorized individuals, entities or processes.
Industrial Security
126 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Glossary
Cyber security
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It also includes the security of
information technologies and electronic information. The term is broad and applies to
everything from computer security to disaster recovery, i.e. the restoration after an incident,
to the training of end users.
Defense in depth
Creation of multiple security mechanisms, especially in a layer structure, with the intention
of slowing down or completely preventing attacks.
DMZ
The demilitarized zone is an autonomous subnet that separates the local area network (LAN)
from the Internet through firewall routers (A and B). The firewall routers are configured in
such a way that they reject data packets for which there were no previous data packets. If a
data packet is sent from the Internet to the server, it is therefore rejected by firewall router A.
If, however, a hacker gains access to a server within the DMZ and sends data packets to the
LAN in an attempt to analyze or hack it, these are rejected by firewall router B.
Firewall
Device to connect networks with one another, which restricts the exchange of data between
two connected networks.
Hacker
Person involved in an intentional hacking activity. The reasons for these activities can be
malicious or not malicious, or also remain within the limits of what is ethnically and legally
acceptable.
Hardening
Procedure in which the security of a system is increased by reducing the area of attack.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 127
Glossary
IANA
The Internet Assigned Numbers Authority (IANA) is a department of ICANN, and is
responsible for assigning numbers and names in the Internet, especially IP addresses. It is
one of the oldest institutions in the Internet.
Incident
One or more unwanted or unexpected events that impair the company operation and
endanger the information security. The cause can be security holes, incorrect configurations
or misconduct and their exploitation.
Industrial security
Measures to increase the industrial security standards of a plant. They protect against
unauthorized access to higher-level control systems, industrial controls and PC-based systems
of the plant as well as against cyber attacks.
Information security
Safeguards the confidentiality, integrity and availability of information.
Integrity
Property which guarantees that resources are free of error and complete.
Malware
Malware is a general term for programs that have been developed to damage users. There
are numerous types of malware, e.g. viruses, trojans, rootkits or spyware.
Man-in-the-disk attack
The concept of a "man-in-the-disk" attack is similar to that of a "man-in-the-middle" attack as
it includes intercepting and editing data, which is exchanged between an external memory
and an application.
Industrial Security
128 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Glossary
Man-in-the-middle attack
In cryptography and cyber security, a man-in-the-middle attack is a cyber attack where the
attacker secretly interjects in the communication between two parties and possibly changes
the associated data. The two parties involved think that they are directly communicating with
one another as the attacker interjected himself between the two parties.
MMP
Abbreviation for SINUMERIK Integrate Manage MyPrograms
MMT
Abbreviation for SINUMERIK Integrate Manage MyTools
NCU
Central control module of a CNC control for NC, HMI, PLC and closed-loop control.
OpenVPN
OpenVPN is a program to establish a virtual private network (VPN) via an encrypted TLS
connection. Libraries belonging to the OpenSSL program are used for encryption. OpenVPN
uses either UDP or TCP for transferring data.
Patch management
Area of the system management whose tasks include the procurement, testing and installing
of several patches (code changes) for an administered computer system or in such a system.
At the same time, a subprocess of the Security Vulnerability Management whose tasks
include the correction and containment of security holes for Siemens products by means of
software corrections.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 129
Glossary
Patterns of viruses
Designation for the database of virus scanners, which contains the schematic and code-
specific structure of all known viruses. This is usually a file that is used and processed by the
virus scanners. The schemata contained in the file are used when checking for viruses and
with them the files to be checked are compared.
PCU
Highly integrated industrial PC for the user interface or system software and user interface of
a CNC.
Phishing
The term "phishing" describes the threat of "using bait to fish for passwords" in e-mails, via
counterfeit links or even text messages (e.g. SMS). What are known as "phishers" attempt to
obtain data via serious or official-looking e-mails and websites. With the aid of malware, they
exploit weak points, e.g. in the operating system or web browser.
Remote access
Use of systems which are within the perimeter of the security zone and that can be accessed
from another geographical location with the same rights as if the systems were physically at
the same location.
SCADA
Supervisory Control and Data Acquisition (SCADA) involves monitoring and controlling
technical processes using a computer system.
Security
Safeguards the confidentiality, integrity and availability of a product, a solution or a service.
Security hole
Weak point in a computer system that allows an attacker to violate the integrity of the
system. As a rule, this is the result of program errors or design defects in the system.
A weak point of a resource or operator element that can be exploited by one or more threats.
SIEM system
SIEM stands for Security Information and Event Management and has become an established
term in IT security. Such systems are able to identify and evaluate security-relevant events
and notify the administrator.
Industrial Security
130 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Glossary
Switch
Network component for connecting several terminal devices or network segments in a local
network (LAN).
Threat
Potential cause of an undesirable incident which may result in damage to a system or
organization.
TIA Portal
The TIA Portal is an automation framework for the SIMATIC S7-1200, S7-300, S7-400 and
S7-1500 CPU families from Siemens.
"TIA" stands for Totally Integrated Automation. In the TIA Portal, all of the necessary software
tools are combined under one user interface.
TLS
Transport Layer Security (TLS V1.2 or higher) is a hybrid encryption protocol for secure
transfer of data in the Internet.
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 131
Glossary
Industrial Security
132 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Index
Deactivating a PROFINET interface
SINUMERIK 840D sl, 57
A SINUMERIK ONE, 57
Defense in depth, 34
Anti-virus program, 49
Defense in depth concept, 34
Application security, 25
Disable
USB interface, 57
Disabling a USB interface
B SINUMERIK, 57
BIOS password DMZ network, 38
PCU 50, 65
Block encryption
SINUMERIK, 67 E
Block protection, 67
Effects, 24
SINUMERIK, 67
Encrypting cycles
SINUMERIK, 66
Exchangeable storage media
C SINAMICS, 103, 104
Certificates SINUMERIK, 60
SIMOTION, 98 Exchangeable storage medium, 48
SINAMICS, 108
Change
Password, 48 F
Changing passwords
Firewall, 38, 47
SINUMERIK, 63
Firmware update
Cloud, 42
MCP/MPP, 56
Cloud Applications, 42
Cloud computing, 23
Cloud Security, 42
Code analysis, 26
H
Communication Hard disk, 48
Communication services, 58 Encrypting, 47
Used port numbers, 58 HMI password, 63
Communication services Hotfix management, 26
SINAMICS, 107 HTTPS
Company security, 36 SIMOTION Web server, 98
Confidentiality levels, 47
Copy protection
SINUMERIK, 66 I
IEC 62443, 29
Industrial security
D Definition, 21
Data Objectives, 21
transporting, 48 Possible effects, 24
Data privacy, 24 Threats, 24
Data storage, 47 Interfaces
Encrypting, 47 Backing up, 47
Internet of things, 23
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 133
Index
Industrial Security
134 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2
Index
T
Tablet PCs, 23
Threat and Risk Analysis, 26
Threats, 24
TLS, 108
TRA, 26
Industrial Security
Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2 135
Index
Industrial Security
136 Configuration Manual, 01/2023, 6FC5397-5EP40-6BA2