System security – Rockwell Automation T8094 8000 Series TMR System Safety Manual User Manual

Page 84

Advertising
background image

SAFETY MANUAL

D oc N umber T8094
I ssue 27 – June 2013

Page 63 of 103

6. SYSTEM SECURITY

Serial networks are closed and local, and have limited protocol functionality. They are
therefore immune to any attack except local deliberate sabotage. Trusted systems,
however, with their Engineering Workstations and DCS are Ethernet networks which
tend to be part of a larger corporate network which opens up limitless possibilities for
accidental or malicious infection or attack.

There are some simple steps that can be taken to help prevent such issues.

The Trusted system should not be on a network with open access to the
internet.

The Firewall must be active on the Engineering Workstation, preventing
access to the relevant Ethernet ports on each communication interface and
anti-virus software must be installed and up to date.

The Engineering Workstation, containing the Toolset, should be password
protected. If it is a laptop, it should be kept locked as it is the key to the
application.

The Ethernet Telnet access should be kept closed (tcp diag off) until required.

If the Toolset uses a USB or parallel dongle, this should be kept securely.
Without it, the Toolset will not run at Workbench version 3.51 and above. At
Workbench version 3.46, the application compilation will not complete.

Keep the maintenance lead securely stored because it can be used for both
configuration and diagnostics.

Ensure that the full compiled application and the system configuration are
securely backed up. The configuration can be recovered from the processor
but the application can not and a full copy of the application is needed for
modifications.

The application should be password protected.

Trusted is quite resistant to radio interference due to its voting structure.
However, sensible use of site radios is advised; do not use radios inside or
near an open panel. The panel doors form part of the RFI protection; the
plastic module cases provide no protection.

The panel doors should be closed and locked. Key operated locks are more
secure than tool operated locks. Terminals, plugs, fuses and relays can all be
dislodged, so are best kept secure.

The processor keyswitch should be turned to the Run position and removed.
This prevents download of system configurations or online changes through
the Toolset.

The module ejectors should remain closed. The ejector tool can be kept with
the processor key. This makes it more difficult to remove modules.

Removable media (USB storage devices, CDs etc.) should be virus checked
before use within the system.

Advertising