Sabp Z 057
Sabp Z 057
1 Introduction……………………............................ 2
2 Conflicts with Mandatory Standards................... 2
3 References......................................................... 2
4 Definitions........................................................... 3
5 Account & passwords Policies............................ 5
6 Services and applications settings.....................11
7 Hardening controls.............................................12
8 Logs and Auditing............................................. 13
1 Introduction
1.1 Purpose and Intended Users
The purpose of this best practice document is to establish a recommended
methodology to implement advanced security configurations for Industrial
Control Systems (ICS). These guidelines are intended for plant network
administrator(s) and technical support staff for the purpose of prompt risk
mitigation and overall adherence to company’s cyber security regulations,
especially those intended for immediate implementation. The intended users
include engineers and / or technicians working as Process Automation Network
(PAN) Administrators.
1.2 Scope
This best practice defines the methodology to harden the 3COM Switches
configurations settings, which might require software / hardware to ensure
“secure configuration” as per SAEP-99 “Process Automation Networks and
Systems Security” procedure.
This implementation of this best practice shall satisfy the audit requirement for
the BIT recommendations and can be assessed using “Performing Security
Compliance Assessment Manual”
1.3 Disclaimer
This Best Practice complements other procedures or best practices provided by
vendor and / or consulting agent for the implementation of security
configurations by the PAN administrator(s), and shall not be considered
“exclusive” to provide “comprehensive” compliance to SAEP-99 or any other
Saudi Aramco Engineering’s standards requirements.
The use of this Best Practice does not relieve the PAN administrator(s) from
their responsibility or duties to confirm and verify the accuracy of any
information presented herein and the thorough coordination with respective
control system steering committee chairman and vendor.
Page 2 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
4 Definitions
This section contains definitions for acronyms, abbreviations, words, and terms as they
are used in this document.
4.1 Acronyms
DCS - Distributed Control System
ESD - Emergency Shutdown Systems
IP - Internet Protocol
ISA - The International Society of Automation
PCS - Process Control Systems
PAN - Process Automation Network
PMS - Power Monitoring System
SCADA - Supervisory Control and Data Acquisition
IP - Internet Protocol
TMS - Terminal Management System
VMS - Vibration Monitoring System
4.2 Abbreviations
Authentication: A security measure designed to establish the validity of a
transmission, message, or originator, or a means of verifying an individual's
authorization to receive specific categories of information. When humans have
assets that are worth to be protected, the authentication always exists. The initial
step in protecting systems and information is authentication that identifies who.
Page 3 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Page 4 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies 3CO-AP-09 : Set the password display mode for local users in encrypted mode
1. Enter privileged system view mode by issuing (using the admin account)
[switch] system-view
2. Issue the following command:
[switch] password cipher New_Password
Instruction
<New_Password>: is newest admin password
Note that the password is entered in encrypted mode. For more detail, please refer
to 3CO-AP-09
Automated task yes
Page 5 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
[switch] undo local-user <user>
<4500>system-view
System View: return to User View with Ctrl+Z.
[4500]local-user 3Com1
[4500-luser-3Com1] password cipher 3Com1_password
Automated task yes
Page 6 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
Instruction [switch] undo snmp-agent community public
3. Issue the following command:
[switch] undo snmp-agent community private
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
Instruction [switch] password-control length 6
Page 7 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
Instruction [switch] password-control aging 90
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
Instruction [switch] password-control login-attempt 5
Page 8 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
Instruction [switch] password-control exceed locktime 1440
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
[switch] password-control history 3
Instruction
3 refers to the number of old passwords for each user account that are saved by the
switch
Page 9 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
12.0.a
Domain 3COM Ref. 3CO-AP-09 BIT
12.0.c
[ ] 4500 family (3CR17771)
[ ] 4200 Family
Target SAEP-99 5.1.6.1.a-f
[ ] 4228G Family (3C17304) Mapping
[ ] 4400 Family
Force local users to display passwords in
Action cipher text (local-user password-display-
mode cipher-force)
State Final Version 1.0 Created on November 2013
R C
RACI Matrix Priority HIGH
A I
Pre requisite
Dependencies
Page 10 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
Page 11 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
7 Hardening controls
Page 12 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Dependencies
1. Enter privileged system view mode by issuing
[switch] system-view
2. Issue the following command:
[switch] history-command max-size 100
Instruction
The history command buffer can store up to 100 commands. The command diplay
history-command could be issued to list the display user inputting
Page 13 of 14
Document Responsibility: Plants Networks Standards Committee SABP-Z-057
Issue Date: 4 May 2015 Network Devices Hardening
Next Planned Update: 4 May 2020 Guide – 3COM Switches
Revision Summary
4 May 2015 New Saudi Aramco Best Practice.
Page 14 of 14