Saep 99 PDF
Saep 99 PDF
Contents
1 Scope................................................................. 2
2 Conflicts and Deviations .................................... 3
3 Applicable Documents ....................................... 3
4 Instruction .......................................................... 5
5 General Security Management .......................... 5
6 Communication and
Configuration Management ........................ 9
7 Physical Security Management ........................ 25
8 Business Continuity Management.................... 26
9 Roles and Responsibilities ............................... 29
Revision Summary................................................. 31
1 Scope
1.1 Purpose
1.2 Application
1.3 Language
In this procedure, the terms “must”, “shall”, “should”, and “can” are used.
When must or shall is used, the item is a mandatory requirement. When should is
used, the item is strongly recommended but not mandatory. When ‘can’ is used,
compliance may further enhance the system security but compliance is optional.
1.4 Exclusions
Any requirement that is not supported by the system shall require the
implementation of mitigating controls that are approved by the plant manager.
Page 2 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
This procedure does not cover Saudi Aramco industrial security requirements
such as gate access, door thickness, lock types or concrete structure.
2.2 Any conflicts between this procedure and other applicable Mandatory Saudi
Aramco Engineering Requirements (MSAERs), or industry standards, codes,
and forms shall be resolved in writing to the manager of Process & Control
Systems Department (P&CSD) of Saudi Aramco, Dhahran.
2.3 Direct all requests to deviate any mandatory security requirement from this
procedure in writing to the manager of P&CSD of Saudi Aramco, Dhahran, in
accordance to SAEP-302.
3 Applicable Documents
The requirements contained in the following documents apply to the extent specified in
this procedure.
Page 3 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Corporate Policy
INT-7 Data Protection and Retention
Page 4 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
4 Instruction
This section provides the minimum mandatory security requirements for ICS as related
to Change Management, Awareness and Training, and Cybersecurity-related
Obsolescence Management. It will address “general” plant operational security
requirements for each topic.
Change management must apply to all and/or any changes made to any
components in ICS.
5.1.1.1 The change management process shall have the capability for
change tracking, approval, scheduling, and verification prior to
the implementation.
Commentary Note:
Page 5 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Page 6 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Page 7 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Commentary Note:
5.4 Documentation
5.4.1 Administrative
5.4.1.3 Approved access request forms should exist for all types of
accounts, including system and application accounts.
Manager approval is required for non-plant personnel.
5.4.2 Technical
Page 8 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
This section provides the minimum mandatory security requirements for ICS as related
to asset management, network security, patch management, access control, monitoring,
and malware prevention management.
Page 9 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Commentary Notes:
Table 1
Physical Space Network
Locked Cabinet Remote Site Connectivity
In-Plant
for Shared Information &
Connectivity Control
Rooms (1) Monitoring
The cabinets Dedicated Fiber optic Transmission
shall have cables for strands for circuit (i.e.,
identification both primary primary and fiber strand,
plates with and backup SDH, OTN, SDH-, OTN, or
contact and or WDM WDM)
information for secondary
Cables shall
be tagged and
secured
Commentary Notes:
Page 10 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Page 11 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.1.4.1 Remote access from across the plant/IT firewall is not allowed.
6.1.4.2 RDP protocol can be allowed from within the plant network
whenever the minimum security requirements are satisfied.
Commentary Note:
6.2.1.3 The asset inventory shall be dated and aligned with other plant
Page 12 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
inventories, if any.
Page 13 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.3.1.3 All accounts and their associated access level and privileges
shall be documented, verified, and reviewed for appropriateness
every 12 months.
6.3.1.9 PAN administrators shall log into the system with the least
privileges account unless otherwise required.
Page 14 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.3.2.2 Users shall maintain their own passwords and keep them
confidential.
Page 15 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.3.2.16 All Password records (e.g., paper, software file, etc.) shall be
avoided unless they are stored securely in a safe and approved
by the plant manager. The file containing encrypted passwords
shall be protected if electronically stored and only readable
with privileged account.
Page 16 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Commentary Note:
6.3.2.19 The following shall apply for systems with hardware key
authentication:
a. The shift coordinator or his delegated shift supervisor shall
be responsible for keeping and issuing the keys.
b. The keys should be restricted to authorized individuals.
c. The use of hardware keys shall be logged.
d. The key shall be securely stored within the facility and be
available after regular working hours.
e. The keys shall only be used for the duration required
f. Key logs shall be reviewed on an annual basis to ensure
that keys are appropriately secured and accounted for.
g. The hardware key shall not be used for administrative
purposes.
Identity and access controls shall not prevent the operation of essential
functions of the sensitive DCS and field devices such as PLCs, IEDs,
RTUs, HMIs, etc.
Page 17 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.3.3.4 Accounts used for any critical functions shall not be locked
out.
6.4.2 PAN administrators shall obtain the latest vendor qualified patch file and
deployed within six (6) months of release.
Commentary Notes:
6.4.3 PAN administrators shall validate the authenticity of the patch and its
compatibility with the ICS system. The validation shall be offline on a
Page 18 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.4.4 PAN administrators shall monitor the system stability post a patch
deployment for each station and shall be able to rollback if needed.
6.4.6 Network equipment software updates process shall satisfy the same
requirements.
Page 19 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.5.4.1 Antivirus software shall be updated every six (6) months upon
ICS vendor certification.
Page 20 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
machine or system.
6.6.1.1 ICS systems shall ensure audit policies are enabled to generate
events for all access, system and must produce an audit event
record for the following event types:
a. Security, system and application event log file
b. Successful and unsuccessful access to log file
c. Successful and unsuccessful authentication events
d. Successful and unsuccessful authorization events
e. Successful and unsuccessful resource access events
f. Successful and unsuccessful privileged operations
g. Creation, modification and deletion of system objects
including all user account types, groups, files and directories
h. Creation, modification and deletion of system and security
policies
i. Changes to logical access control authorities (e.g., rights,
permissions)
6.6.1.2 The audit event record shall include, at minimum, the following
information:
a. Timestamp
b. User ID
Page 21 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.6.3.3 In the absence of the Saudi Aramco corporate SIEM, audit logs
shall be consolidated and stored centrally.
Commentary Note:
6.6.3.4 Electronic audit logs older than (12) months can be purged.
6.6.3.5 Hardcopy audit logs older than (12) months shall be “securely
destroyed without the possibility of being reconstituted” per
GI-0710.002.
6.6.5.1 Logging for sensitive field devices such as PLCs, IEDs, RTUs,
Page 22 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.6.5.2 The data diode appliance inherently does not support the
forwarding of generated security, performance and availability
information to a third party tool, nor does it have the capability
to store generated performance and security information for the
required retention duration (12 months). Therefore, it is
exempted from third party monitoring, reporting and retention
requirements. (6.1.3.2, 6.6.3.1, 6.6.4.2).
6.7.1.1 The plant shall not implement the controls without consulting
with the vendor.
Page 23 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
6.7.2.5 The firewall filter rules must be set to deny all traffic by default
then enable only necessary and approved services.
6.7.2.6 Users are not allowed to make any changes to their system that
will disable or tamper approved antivirus software or otherwise
prevent the software from performing its intended purpose.
Page 24 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
This section provides the minimum mandatory security requirements to ensure critical
or sensitive information processing facilities are physically protected from unauthorized
accesses, damages, and interferences.
The physical security management controls shall be applied to reduce the risk of
physical misuse, damage or unauthorized access. The critical information and
assets shall be placed in a secure area protected by security perimeters and entry
controls.
Page 25 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
7.2.1 Ensure that sensitive documents and other media material that are no
longer needed are completely destroyed.
This section sets forth instructions and directives for developing plans and strategies to
enable the business to continue while providing a course of action to recover promptly
from any type of disruption to the business.
The following are the requirements for Disaster Recovery Planning (DRP) for
Saudi Aramco ICS. For more information, refer to SABP-Z-073.
8.1.1 DRP shall be developed based upon a formal risk assessment or business
impact analysis.
8.1.2 DRP document shall provide instructions on restoring the plant operation
Page 26 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
8.1.3 A team within each plant organization shall be established and well
trained to develop, implement, test, use, and maintain the DRP.
8.1.4 Key personnel list shall be clearly identified including plant personnel,
support organizations, and vendors.
8.1.5 DRP shall define the data backup strategy identifying the systems to
backup, files to backup, the storage media, the locations of the storage
and the storage retention.
8.1.6 DRP shall be addressed as part of the overall plant process disaster
response plan.
8.1.7 DRP shall be reviewed, updated, tested, and approved once a year,
documenting such reviews in writing.
8.1.8 If change(s) to ICS infrastructure take place within the annual review
cycle, the DRP shall be reviewed, updated, tested, and approved within
one (1) month after the changes are commissioned. Accordingly, the
new test date should be one year from the last revision.
8.1.10 Testing of the DRP plan should be done off line in a testing environment
and not on the actual system if the off line systems are available.
8.1.11 A distribution list shall be defined for the DRP and kept up to date.
A process shall exist to ensure DRP is distributed to all authorized
recipients.
Page 27 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
8.2.2 The procedure shall cover the following for each ICS component:
a. Personnel responsible for performing backups, restoration and
monitoring success or failure if automated
b. Step-by-step instructions to perform a backup and subsequent
restore in accordance with vendor recommendations
c. Restoration testing and maintenance of restoration test results after
performing backups
d. Verification of the success or failure of a particular backup
e. Media library management relating to retention, rotation,
transmittal, labeling, and inventories.
8.2.5 Critical ICS components with dynamic data change shall be backed up at
least on weekly basis. The data required for complete backup and
restore shall be archived at least once every six (6) months.
8.2.6 Network devices configuration files shall be backed up every six (6)
months.
8.2.8 A logbook shall be maintained at each storage location for the purpose of
monitoring access to the backup media. Entries shall be recorded in the
logbook whenever a media is removed/added from/to the designated
storage location. The logbook shall contain the following:
a. Date and time of removal/addition,
Page 28 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
8.2.9 A backup and restoration log shall be maintained for all backup /
restoration operations, covering at least their success or failure state,
date, personal performing the operation and the media labels used.
9.1.1 Plant manager shall assume the ownership of all plant assets.
9.1.2 Plant organization shall have at least one qualified primary and one
secondary PAN administrators.
Commentary Note:
9.1.3 Access and privileges to plant systems shall be approved by the plant
management and commensurate with the user’s business roles and
responsibilities.
Page 29 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
9.1.4 The plant manager shall be responsible for all ICS assets, throughout
their lifecycle.
9.1.5 Assets can conveniently be grouped for a particular service and assigned
to a service owner. The service owner retains the accountability to
deliver the service and operate the assets.
9.1.6 The plant organization is responsible for developing a DRP that covers
all ICS installed in the plant.
9.2.2 PAN administrators shall obtain a prior approval from Admin Area
compliance entity for any firewall rules change.
9.2.3 PAN administrators shall create and maintain the accuracy of the PAN
administrator email distribution lists relevant to their plants.
9.2.5 PAN administrators shall be responsible for ensuring the authenticity and
integrity of any software or instructions, through a cryptographic hashing
algorithm, prior deployment onto ICS.
This section pertains to other Saudi Aramco users such as Engineering Services,
Auditing, IT, etc.
9.3.1 Plant users shall sign statements indicating that they understand the
terms and conditions of access.
Page 30 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
9.3.2 All other Saudi Aramco employees requiring temporary access to any
plant systems shall sign a liability agreement (refer to Appendix F).
9.4.2 PAN administrators shall ensure that the contracts and other agreements
between the Saudi Aramco plants and contractors or third party
organizations be aligned with this procedure and its subsequent
documents.
9.4.3 PAN administrators shall ensure that contractors, vendors, and third-party
organizations comply with the procurement requirement of the ICS.
Commentary Note:
9.4.4 PAN administrators shall ensure that contractors, vendors and third party
organizations requiring temporary access to any plant systems sign a
liability agreement (refer to Appendix F).
9.5.2 The plant manager may elect to delegate some of his authorities to other
personnel in his organization, provided that such delegation is documented.
Revision Summary
27 April 2014 Major revision to reflect BIT mandates.
6 November 2014 Editorial revision to transfer this engineering document from Communications Standards
Committee to be under the newly established Plants Networks Standards Committee.
27 April 2014 Major revision to reflect BIT mandates.
15 October 2015 Major revision to reflect Audit IS2105-426 observations.
25 January 2017 Major revision to complete restructure and align with the relevant international standards.
Revision is required due to:
- Cyber security challenges evolving
- Align with the International Standards new requirements
- Align with Company directions (i.e., BIT, CISO, ERM)
Page 31 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Appendix A - Acronyms
ACL Access Control List
AD Active Directory
AV Antivirus
DCS Distributed Control System
DHCP Dynamic Host Configuration Protocol
DRP Disaster Recovery Planning
ESD Emergency Shutdown Systems
HMI Human-Machine Interface
HSE Health, Safety, and Environment
FTP File Transfer Protocol
ICS Industrial Control System
IED Intelligent Electronic Device
IOS Internetwork Operating System
IPS Intrusion Prevention System
ISD Information Security Department
NDA Non-Disclosure Agreement
NIST National Institute of Standards and Technology
NTP Network Time Protocol
PAN Process Automation Network (also: Plant Information Network)
PIB Process Interface Buildings
PCN Process Control Network
PCS Process Control Systems
P&CSD Process & Control Systems Department
PLC Programmable Logic Controller
PMS Power Monitoring System
RDP/TSE Remote Desktop Protocol/Terminal Services
RTU Remote Terminal Unit (also Remote Telemetry Unit)
SABP Saudi Aramco Best Practice
SCADA Supervisory Control and Data Acquisition
SDH Synchronous Digital Hierarchy
SIEM Security Information and Event Management
SLA Service Level of Agreement
SOC Security Operation Center
SSH Secure Shell
SNMP Simple Network Management Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TLS/SSL Transport Layer Security/Secure Sockets Layer
TMS Terminal Management System
USB Universal Serial Bus
VLAN Virtual Local Area Network
VMS Vibration Monitoring System
VPN Virtual Private Network
WAN Wide Area Network
Page 32 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Appendix B - Definitions
Access Control: Means of controlling and regulating access to computing resources and
information.
Asset: An asset is anything that has value to the organization and which therefore requires
protection. Bear in mind that a plant system consists of more than just hardware and software.
Autonomous System: It is referring to a single system such as DCS, SCADA, CCTV, TMS,
PMS, etc. Autonomous in this context means a collection of devices that are interconnected to
form a unified system serving as a single application.
Backup: A data image stored separately from the original, for use if the original becomes lost
or damaged.
Configuration Baseline: A system configuration that has been approved at a point in time and
should be changed only through a formal change control procedure. The configuration baseline
can be used as basis for future changes.
Data Diode: It is a simple modified fiber optic cable, with send and receive transceivers
removed for one direction.
Hardware Key: A physical key or dongle that is used to regulate access to a system or an
application.
Industrial Control System (ICS): Integrated system which is used to automate, monitor
and/or control an operating facility (e.g., plant process units). The ICS consists of operating
area automation systems and their related auxiliary systems which are connected together at the
PCN and PAN level to form a single integrated system.
Page 33 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Insecure Protocols: Any protocol or service the introduces security concerns due to the lack
of controls over confidentiality and/or availability and/or integrity. Example of insecure
services include but not limited to FTP, Telnet, SNMP, and HTTP.
Operator Account: The account used by plant operator to access the system characterized
with restricted profile with least access rights.
PAN: A plant wide network interconnecting Process Control Networks (PCN) and provides an
interface to the WAN. A PAN does not include proprietary process control networks provided
as part of a vendor's standard process control system.
Password: Sequence of characters (letters, numbers, symbols) used as a secret key for
accessing a computer system or network.
Plant Main Gate(s): Physically restricted access points through perimeter security fencing
into Saudi Aramco process facilities. Such points, when manned, are typically controlled by
Saudi Aramco Industrial Security Operations (ISO) organizations via identification, privilege
validation and logging. While both manual and electronic procedures are in still in use, the use
of electronic ID card readers has become the prevalent methodology.
Primary Assets: Are those assets whose compromise will, in any way possible, hinder the
organization from accomplishing its business objective(s): information, core business processes.
Process Control Network (PCN): A proprietary process control networks provided as part of
a vendor's standard process control system.
Page 34 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Remote Access: The ability of a user to connect to a network asset (system, device or
application) from distant location. When connected, the user can monitor or manipulate the
configuration to modify or update the asset’s capabilities.
Secure Room: A room within plant premise, i.e., CCR or server rooms, where physical
security controls such as access identification, authorization, and logging are applied.
Security Awareness: A formal training process for educating employees about computer
security. It explains proper rules of behavior for the use of plants systems and information.
Separation (Logical): Logical separation is indicated by the virtual isolation of network assets
by means of multiplexing or the use of software emulation technologies such as VLAN, VPN
or SDH dedicated circuits.
Service Level Agreement (SLA): Contract between a service provider and a customer, it
details the nature, quality, and scope of the service to be provided.
Shared Operator Account: Plant operator account that is shared between operators due to
system’s limitation, vendor practice or operational requirements.
Supporting Assets: Assets servicing primary assets; typically include: hardware, software,
network, and personnel.
Page 35 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Page 36 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Page 37 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
ICS
Networks and Systems Data Collection Sheet
Admin Area: _______________________________________
Site: _______________________________________
Operating Area: _______________________________________
PAN Admin: _______________________________________ Phone: ______________
Area IT Contact: _______________________________________ Phone: ______________
Last Updated: _______________________________________
Page 38 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Network Devices
What network security measures are put in place? (E.g., Firewalls, Routers, IPS, IDS, VLANs, etc.)
________________________ ________________________ ________________________
________________________ ________________________ ________________________
_________________ Total Number of unmanaged L2 Switches
_________________ Total Number of managed L2 Switches
_________________ Total number of managed L3 switches
_________________ Total number of routers
_________________ Total number of firewalls
Switches, Routers and Firewalls vendors:
☐ Cisco Systems ☐ Alcatel-Lucent ☐ Juniper Networks
☐ Hewlett-Packard ☐ Huawei ☐ Moxa
☐ Hirschmann ☐ Black Box ☐ Omnitron
☐ Allied Telesis ☐ 3COM ☐ Harting
☐ Siemens ☐Enterasys ☐ TRENDnet
☐ ABB ☐ADC Megabit (Modem) ☐Fujitsu
☐ Digi Systems ☐ EtherWAN ☐ LANTRONIX
☐ NetGear ☐ Linksys (Cisco) ☐ LinkPro
☐ Allied Telesyn ☐ Other: (Specify) ________________________
________________________
________________________
Page 39 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
ICS Platforms
_________________ Number of Automation platforms
Automation System type(s) ________________ ________________ ________________
________________ ________________ ________________
________________ ________________ ________________
________________ ________________ ________________
Automation System
________________ ________________ ________________
vendor(s)
________________ ________________ ________________
Operator consoles and HMI devices
_________________ Number of operator consoles
Operator console vendor(s) ________________ ________________ ________________
Model(s) ________________ ________________ ________________
HMI Operating System(s) ________________ ________________ ________________
Application Nodes (Select all that ☐ Process management and ☐ SCADA
apply) control server
☐ Engineering workstation ☐ OPC Scan node
☐ OPC Server ☐ PRM
Others: (Specify) _______________________ _______________________
_______________________ _______________________
_______________________ _______________________
_______________________ _______________________
Cyber Security
O.S patches, DAT file updates,
Network Security Support?
☐ Site support ☐ Internal (company-provided) ☐ External (Third-party)
Up-to-date simple network topology map is available?
☐ Yes ☐ No If yes, date completed: ______________
Up-to-date detailed network topology map is available?
☐ Yes ☐ No If yes, date completed: ______________
Security Office audit completed?
☐ Yes ☐ No If yes, date completed: ______________
Page 40 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Obsolescence
Network Devices Tracking Form x.x
Count Brand/Model Network Device Type Software Revision
Page 41 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
1. Hardware
Any physical element supporting a primary asset falls under the hardware category:
a. Data processing equipment (active)
b. Transportable equipment (e.g., laptops, PDAs)
c. Fixed equipment used on the company’s premise such as servers or workstations
d. Processing peripherals are equipment connected to a communication port
(e.g., serial, parallel) for entering, conveying or transmitting data. Examples
include printers, removable disk drives, etc.
e. Passive data medium used for storing data
f. Electronic medium connected to a computer/computer network for data storage
such as floppy disc, CD ROM, back-up cartridge, removable hard disc, memory
key, tape
g. Static, non-electronic media containing data such as plant documentation
2. Software
a. Operating system
b. Service, maintenance or administration software
c. Standard, off-the-shelf software
d. Business application, whether it is a standard or a custom one
3. Network
a. Communication media and equipment. Examples include PTSN, Ethernet,
ADSL, Wi-Fi 802.11, Bluetooth, etc.
b. Passive or active relay such as bridges, routers, hubs, switches, automatic
exchange
c. Communication interface such as Network Interface Card (NIC), General Packet
Radio Service (GPRS)
Page 42 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Saudi Aramco plants (“The Plant”) occasionally provides Vendors (“Vendor”) or Non-Plant Saudi
Aramco employee access to sensitive computing equipment (servers, workstations, DCS, switches)
located on-site in the facility. This access is typically provided to:
- Third Party Vendor who has a Service Contract or Agreement with the plant;
- Non-Plant Saudi Aramco employee from a department who has to provide engineering /
technical consulting service to the Plant.
The following Terms and Conditions must be agreed to in writing by the Vendor / Non-Plant Saudi
Aramco employee and approved by the Plant Manager or Superintendent.
Acceptable Uses
The access to the plant computing equipment shall satisfy the following:
(1) The access is granted to the undersigned only;
(2) The access credentials (username and password) are temporary and granted for the only duration of
the assignment;
(3) The access credential shall satisfy the SAEP-99 – 6.3.2 requirements;
(4) The undersigned shall not allow another person to use his temporary access;
(5) The access is granted solely for the purpose of:
- Scheduled troubleshooting;
- System / network maintenance;
- Updates or upgrade to the plant computing equipment (Hardware, Operation System,
application, software ...);
- Computing equipment configuration technical review;
- Annual IT auditing / risk assessment;
- Security and compliance technical review.
Prohibited Uses
It is prohibited to use the granted temporary access to the plant computing equipment in ways to
perform the following (but not limited to):
(1) Unauthorized use of the temporary account for duplicating, deleting, or modifying electronic
materials;
(2) Intentional damage to hardware, software, network equipment, security devices, or other
technology resources;
(3) Intentional creation or distribution of viruses, worms or other forms of electronic malware;
(4) Unauthorized copy of plants data (refer to Scope of Data)
(5) Unauthorized installation and use of non-approved applications, software or other related
computer scripts.
Page 43 of 44
Document Responsibility: Plants Networks Standards Committee SAEP-99
Issue Date: 25 January 2017
Next Planned Update: 25 January 2020 Saudi Aramco Industrial Control System Security
Scope of Data
Data used and stored by the Plant may contain “Restricted, Highly-Sensitive, Confidential, etc.”
information which include (but not limited to):
- Computing equipment configurations and logs;
- PI systems configuration and databases;
- Backup data;
- Any classified information defined by Saudi Aramco General Instructions GI-0710.002.
Verification and Monitoring of Work
All work performed by the Vendor/Non Plant Saudi Aramco Employee while connected to the plant
computing equipment shall be monitored by the plant administrator or any technical staff member.
Limitation of Liability
The under signee (Vendor/Non-Plant Saudi Aramco employee) shall be liable for any direct, indirect,
incidental or consequential damages pertaining to the temporary access given, whether foreseeable or
unforeseeable, based on claims (including, but not limited to, claims for failure to provide services,
mistakes, omissions, business interruptions, deletion or corruption of files, errors, or defects) arising out
of or in any way connected with the temporary access granted.
Acknowledgement
I have read and understand the statements presented in the above “Non-disclosure, Confidentiality, and
Liability Agreement” regarding my permitted and potential/inadvertent access to confidential or
sensitive information or data;
(1) I agree with these stated responsibilities;
(2) I understand that misuse of confidential or sensitive information or data, whether intentional or
due to neglect on my part, is a breach of Saudi Aramco plant security policy and grounds for
corrective action which may include my dismissal, the termination of access to plant computer
and network resources, or the termination of a contractual agreement and may subject me to
possible civil and/or criminal legal action.
Page 44 of 44