5th Gen Deployment Guide Ph1
5th Gen Deployment Guide Ph1
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
1
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
2
Cybersecurity Disclaimer
The MiCOM P40 family of products are digital devices designed to be installed and operated in utility
substations and industrial plant environments and connected to secure private networks. These
products should not be connected to the public internet.
GE strongly recommends that users protect their digital devices using a defence-in-depth strategy
which will protect their products, their network, their systems and interfaces against cybersecurity
threats. This includes, but is not limited to:
Placing digital devices inside the control system network security perimeter
Deploying and maintaining access controls, monitoring and intrusion detection
Security awareness training
Security policies
Network segmentation and firewalls installation
Strong and active password management
Data encryption
Antivirus and other mitigating applicable technologies
MiCOM P40 Generation 5 relays are available with enhanced cybersecurity mechanisms with flexible
configuration. GE Vernova strongly recommends usage of the security controls to protect the system
against cybersecurity intrusion.
For additional details and recommendations on how to protect MiCOM P40 relays, please see the
Hardening Setup section below. From time to time, we may also provide additional instructions and
recommendations relating to the MiCOM P40 Family and cybersecurity threats or vulnerabilities.
As a user, it is your sole responsibility to make sure that all MiCOM P40 relays are installed and
operated in accordance with its cybersecurity capabilities, security features, and the instructions and
recommendations. Users assume responsibility for all risks and liabilities associated with damages or
losses incurred in connection with any cybersecurity incidences.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
3
Contents
1. Introduction .................................................................................................................................................................................... 6
2. Product Defence-in-Depth Strategy .................................................................................................................................. 7
3. Environment ................................................................................................................................................................................... 8
4. Secure Installation - Hardening ........................................................................................................................................... 9
4.1. Verifying software integrity ....................................................................................................................................... 9
4.2. Upgrading firmware to the latest version .......................................................................................................... 9
4.3. Disable unused protocols and ports ..................................................................................................................... 9
4.4. User authentication and roles:................................................................................................................................. 9
4.4.1. Modify default passwords .................................................................................................................................... 9
4.4.2. Create non-shared user accounts ................................................................................................................ 10
5. MiCOM P40 5th Generation Secure Installation ........................................................................................................ 11
5.1. Security recommendations .................................................................................................................................... 11
5.2. Bypass access: .............................................................................................................................................................. 11
5.3. Local configurable user accounts ....................................................................................................................... 11
5.4. RADIUS authentication ............................................................................................................................................. 11
5.5. Password expiry and age ........................................................................................................................................ 12
5.6. Secure event logging ................................................................................................................................................. 12
5.6.1. Syslog server ............................................................................................................................................................ 12
5.6.2. Security events storage on relay ................................................................................................................... 12
5.7. Maximum user connections to relay ................................................................................................................. 12
5.8. Role permission mapping ........................................................................................................................................ 12
6. S1 Agile Configuration Software ....................................................................................................................................... 13
6.1. Secure firmware upgrade ....................................................................................................................................... 13
7. Maintaining Security ............................................................................................................................................................... 14
7.1. Periodic security audits............................................................................................................................................. 14
7.2. Backup and restore procedures .......................................................................................................................... 14
7.3. Vulnerability monitoring and firmware updates.......................................................................................... 14
7.4. Reporting a vulnerability .......................................................................................................................................... 14
8. Decommissioning ..................................................................................................................................................................... 16
8.1. Secure decommissioning - configuration and sensitive data .............................................................. 16
9. Secure Operation Guidelines .............................................................................................................................................. 17
10. Appendices .................................................................................................................................................................................. 18
10.1. The secure development life cycle process: IEC 62443-4-1................................................................... 18
10.2. Certification: IEC 27001............................................................................................................................................. 18
10.3. List of supported protocols ..................................................................................................................................... 18
10.4. IEC 62443-4-1 mapping ........................................................................................................................................... 19
11. List of Acronyms........................................................................................................................................................................ 20
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
4
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
5
1. Introduction
This document describes the best practices to securely install and operate your MiCOM P40 relay and
the accompanying MiCOM S1 Agile configuration software. It also provides an overview of the
supported cybersecurity features. This document applies to MiCOM P40 5 th Generation, Software
Version AA and later.
MiCOM P40 5th Generation relays have effective advanced security controls in place. The relay
supports:
Local as well as centralized user authentication
Role Based Access Control (RBAC)
Logging security events in the syslog format to configured syslog server
Secure firmware upgrade
It supports the creation of up to 10 user accounts on the relay with unique usernames. Roles can be
assigned to these accounts. As part of product hardening, it is possible to disable unused ports,
protocols, and services.
This document describes security related information on the recommended configurations.
This document assumes that the reader is familiar with the product.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
6
2. Product Defence-in-Depth Strategy
The product implements the following security features:
Secure design process to ensure that cybersecurity is part of the design process and not an
afterthought.
Security and penetration testing to detect, as far as possible, vulnerabilities at the design stage.
Digital signature of firmware and software, to allow verification of integrity and authenticity
before installation.
Monitoring of software components vulnerabilities and security bulletins, to inform users of newly
discovered vulnerabilities and threats.
User authentication.
Role-based access control, to enforce correct privileges in accordance with the area of
responsibility.
Password and user account policies, to prevent use of weak passwords and password brute force
attack.
Centralized user management (using RADIUS), to allow prompt removal of user accounts.
Security event logging for post-incident analysis.
Centralized security event logging using SYSLOG protocol. This allows events to be sent to a
Security Operations Centre (SOC) for close to real time security monitoring.
Hardening to reduce the attack surface (making it more difficult for cybersecurity attacks).
To complement the defence-in-depth strategy, the product must be installed in a secure environment.
The product cannot mitigate DoS attack through network interface overload.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
7
3. Environment
The MiCOM P40 5th Generation relay and S1 Agile configuration software is designed to be installed
and operated in a utility and industrial environment with connection to a private network inside the
Electronic Security Perimeter (ESP).
Although the rest of this guide describes security measures at the product level, requirements to
achieve good security go beyond just the product.
We recommend that your security concept considers the whole system, in which the relays are
installed, in accordance with a Defence-in-Depth approach. Security includes (but is not restricted to):
Physical security such as building access control and locked cabinets.
Security policies.
Access control.
Network security measures, such as IP segmentation, use of firewalls and use of secure protocols.
Consider employing an Operations Technology (OT) next generation firewall. This would enforce
OT policy at the protocol level and monitor and block malicious activity and unintended
disruptions.
Protection/Control system devices, such as the MiCOM P40 Family, should not be connected
directly to the internet.
Security monitoring, such as network intrusion detection systems, security event logging using a
centralized server.
System hardening by disabling unused processes and ports, and removal of unused connection
links.
Remote configuration/monitoring of the device must be done from a secure engineering
workstation through a trusted network link.
Use secure methods for remote access, such as a Virtual Private Network (VPN), dual
authentication, recognizing that the VPN is only as secure as the connected devices.
We recommend that S1 Agile configuration software is not continuously connected to a MiCOM
P40 relay when a relay is in service. It is not intended for SCADA/continuous monitoring
applications.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
8
4. Secure Installation - Hardening
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
9
When you receive a MiCOM P40 5th Generation relay, we recommend that you log into the relay using
the default password and change the passwords using unique strings for all the accounts.
Privileged users with “Administrator” roles can change passwords for all local accounts.
We recommend that you configure a unique and strong password. Passwords can be modified from
the HMI as well as the S1 Agile configuration software.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
10
5. MiCOM P40 5th Generation Secure Installation
MiCOM P40 5th Generation relays have security features including Role-Based Access Control.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
11
Configuration for RADIUS authentication (settings: server IP, port, vendor ID, timeout and retries) can
be done using the P40 5th Generation relay HMI and the S1 Agile configuration software. The RADIUS
server also needs an authentication secret to be available for the NEW MiCOM relay. The Secret is a
string, that can be configured using the MiCOM P40 5th Generation relay and MiCOM S1 Agile.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
12
6. S1 Agile Configuration Software
S1 Agile is configuration software designed to be used with MiCOM P40 5th Generation relays. With
this, you can manage offline projects, connect to the relay, update the relay configuration, and
monitor actual values like status, metering and diagnostics.
Communication between the configuration software and the MiCOM P40 5th Generation relay is
carried out over Courier protocol. Sensitive information like the user password is transmitted in an
encrypted format.
The relay supports the disabling of the Courier protocol as part of hardening. When the courier
protocol is disabled, the relay’s configuration cannot be modified. GE Vernova recommends the
disabling of the Courier protocol during normal operation and after installation of the relay.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
13
7. Maintaining Security
Once good security has been properly configured, it is important to create procedures to maintain
security over time.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
15
8. Decommissioning
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
16
9. Secure Operation Guidelines
To ensure secure operation of the MiCOM P40 5th Generation relay, we recommend that:
Users are assigned a specific role at a level sufficient for the tasks they must perform.
Users change their passwords when they believe there might be a possibility of unwanted
disclosure.
Default account passwords are changed before putting the device into operation.
Users log out of their session when finished (although an inactivity timeout can be set to
automatically terminate user sessions).
The product is never connected to a public network, nor the Internet.
Only the required services are configured and enabled.
Periodically review all user accounts and disable/remove those accounts that are not active.
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
17
10. Appendices
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
18
MENU Default Cell Available
UI Col Row Data Type Strings Min Max Step
TEXT Setting Type Setting
SNTP 25 23 Indexed String G37 Enabled Setting 0 = Disabled 0 1 1
or
1 = Enabled
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
19
11. List of Acronyms
ESP - Electronic Security Perimeter
PSIRT - Product Security Incident Response Team
RBAC - Role Based Access Control
OC - Order Code
MiCOM P40 family version 1.0x and later - Secure Deployment Guide
20
Imagination at work
GE Vernova
St Leonards Building
Redhill Business Park
Stafford, ST16 1WT, UK
+44 (0) 1785 250 070
contact.centre@ge.com
© 2024 GE Vernova. All rights reserved. Information contained in this document is indicative only. No representation or warranty is given or
should be relied on that it is complete or correct or will apply to any particular project. This will depend on the technical and commercial
circumstances. It is provided without liability and is subject to change without notice. Reproduction, use or disclosure to third parties,
without express written authority, is strictly prohibited.