ServiceUser Manual
ServiceUser Manual
EC-US-L1
Released
Read this entire manual and all other publications pertaining to the work to be
performed before installing, operating, or servicing this equipment.
Practice all plant and safety instructions and precautions.
General
Precautions Failure to follow instructions can cause personal injury and/or property damage.
This publication may have been revised or updated since this copy was produced.
To verify that you have the latest revision, check manual 26455, Customer
Publication Cross Reference and Revision Status & Distribution Restrictions, on
Revisions the publications page of the Woodward website:
http://www.woodward.com
Revisions— A bold, black line alongside the text identifies changes in this publication since the
last revision.
Woodward reserves the right to update any portion of this publication at any time. Information provided by Woodward is
believed to be correct and reliable. However, no responsibility is assumed by Woodward unless otherwise expressly
undertaken.
Manual 26479
Copyright © Woodward, Inc. 2020 - 2021
All Rights Reserved
EC-US-L1
Released
Contents
Woodward 1
EC-US-L1
Released
Woodward 2
EC-US-L1
Released
• DANGER - Indicates a hazardous situation, which if not avoided, will result in death or serious injury.
• WARNING - Indicates a hazardous situation, which if not avoided, could result in death or serious
injury.
• CAUTION - Indicates a hazardous situation, which if not avoided, could result in minor or moderate
injury.
• NOTICE - Indicates a hazard that could result in property damage only (including damage to the
control).
• IMPORTANT - Designates an operating tip or maintenance suggestion.
Woodward 3
EC-US-L1
Released
Chapter 1.
Purpose
This manual provides information on cybersecurity strategies for the Woodward MicroNet Plus and
MicroNet TMR turbine control systems. Woodward offers CPUs that with a variety of cybersecurity
capabilities including user account management with secure passwords, secure applications and
encrypted communications. Some versions are Achilles certified.
The minimum CPUs that should be considered for use in security-critical applications are versions with
user levels and secure passwords. The 5466-1035 and -1141 CPU on MicroNet Plus and the 5466-1047
and -1247 CPUs for MicroNet TMR do not meet these requirements. If your system has one of these
CPUs (or an older Pentium/NT CPU with Ethernet) the system should be upgraded to one of the modern
CPUs for security.
MicroNet Plus
CPU Preferred Min. Coder Secure Passwords Achilles Cert SSH/Firewall SecureApp
5466-1035 No 4.06 No No No No
5466-1045 No 6.00-1 Yes No Yes No
5466-1141 No 6.00-4 No No No Yes
5466-1145 No 6.00-4 Yes Yes Yes No
5466-1245 No 6.00-4 Yes No No No
5466-1511 Yes Plus 1.02 Yes Yes Yes No
5466-1521 Yes Plus 1.02 Yes Yes Yes Yes
MicroNet TMR
CPU Preferred Min. Coder Secure Passwords Achilles Cert SSH/Firewall SecureApp
5466-1047 No 4.06 No No No No
5466-1247 No 6.00-1 Yes No Yes No
5466-1347 Yes TMR 1.01 Yes Yes No No
Woodward 4
EC-US-L1
Released
Chapter 2.
Defense-in-Depth (DiD)
This chapter introduces the concept of Defense-in-Depth (DiD) with respect to industrial control systems.
The following chapters of this manual discuss the implementation and configuration details of security
controls and appliances used to achieve DiD. Figure 2 1 Defense-in-Depth (DiD) summarizes these
methods and techniques.
The attack vectors in Figure 2 1 Defense-in-Depth (DiD) illustrate a few examples of attacks which could
impact the availability and integrity of industrial control systems. A man-in-the-middle attack could exploit
vulnerabilities of OPC or Modbus communication networks. One scenario for this type of attack involves
an attacker controlling and possible altering messages/packets/data between two parties. In a man-in-
the-middle attack the integrity of sensor date or output commands could be compromised leading to the
loss of an asset. A replay attack can have the same impact, but it exploits valid messages/packets/data
which are repeated/delayed in order to fool the parties into believing a false context exists. One scenario
for this type of attack could be the replay of a valid start permissive which disrupts the intended sequence
of operation.
Woodward 5
EC-US-L1
Released
Woodward 6
EC-US-L1
Released
Chapter 3.
System Access
Supports:
•Live parameter monitoring and tuning
•Tunable maintenance (tunable captures, editing,
comparing and uploading)
•Alarms and Events viewing from SOS
servers/controls with AE support
•Graphing and trending
GAP Application Configuration Error Log System Logs
(.log?) PCT allows exporting
Alarm Log
Event Log
GAP Programmer
(Woodard Coder)
iFix User Interface (HMI / GUI)
Ladder Logic
Monitor GAP
(and GAP Editor)
NetSim1 The suite of tools used for running simulations of
equipment controlled by GAP-based Woodward
systems.
1 License required
Woodward 7
EC-US-L1
Released
2Freeware
3See CIP-7 R5.3 Default Passwords requires that all default passwords be
changed prior to activating and operating a control system.
Woodward 8
EC-US-L1
Released
4.TheGAP application permits configuration of the Security Level associated with each user account.
More information is available in 3.2 Password Manager Default Settings and 3.4 Account Levels.
Woodward 9
EC-US-L1
Released
NOTE on RTN Credentials: If the control system includes a set of expansion chassis in a Real Time
Network (RTN), these are also preconfigured with the default accounts. The RTN is on a private control-
only network, so it is only accessible after first logging into the main CPU and is thus not vulnerable to
unprivileged access. Its credentials may be left at default or changed to match the credentials on the main
CPU. Credentials may be changed on an RTN CPU as follows:
1) Login to the main CPU with the AppManager tool
2) Use the Manage RTN CPUs… command from the Control menu of AppManager
3) Right-click on the desired RTN CPU from the window which appears
4) Select Administer Accounts
5) Specify Administrator credentials when prompted to login to the RTN CPU
4. The SOS Servlink OPC program should be configured to enable the OPC security interface. This
interface requires client programs to pass in credentials rather than using credentials stored on the
SOS Security Options page.
Note on SOS Credentials: SOS can be configured to communicate with multiple controls. Some
OPC clients, like Woodward’s Control Assistant or an HMI tool, can communicate, through SOS, to
these different controls simultaneously. If multiple controls are to be serviced at one time with a PC
running the SOS program, it is recommended to create the same account configuration on each
control. Each client tool can only specify one set of credentials for all controls (this is especially true if
the default credentials of SOS are used); if these credentials correspond to different or non-existent
security levels, the tool behavior may be confusing.
5. The MicroNet Plus controls with SSH encryption have built-in firewalls (see Chapter 4, Control
Firewall) which only allows access to the Secure Shell (SSH) port and any ports which the application
exposes.
a. Ethernet ports like those used by Modbus® * or EGD are not secure. Data in such a network
can be viewed and possibly modified. For a secure control, it is recommended to use SOS to
achieve HMI communication (through OPC) instead of using unsecure protocols like Modbus or
EGD. SOS uses the SSH port and thus all of its communications are protected by login access
and encrypted transfer.
b. Even the SSH port is vulnerable to DNS (“Denial of Service”) attacks such as data-storm
attacks. While it is not possible to read or write data to this channel maliciously, it is possible to
make the port so busy that desired communication cannot reliably transpire. As such, it is
recommended not to put any mission-critical functionality exclusively into remote devices like an
HMI PC. Instead, hard-wired operation controls should be established for emergency control in
case of communication unavailability.
*—Modbus is a trademark of Schneider Automation Inc.
Woodward 10
EC-US-L1
Released
Woodward 11
EC-US-L1
Released
Woodward 12
EC-US-L1
Released
3.5 History
1. The following files are stored in the MicroNet Plus and TMR controls
a. PMLog.txt
i. Contains all successful and unsuccessful logins and logouts.
Note: There may be more than one entry per successful login
ii. Contains password changes
iii. Contains other account modifications (by Administrator) iv. All entries are
marked with the date and the account name of the accessing user
b. Log.txt
i. Contains application events
ii. Identifies and dates privileged access which modify control contents
StartApplication
• StopApplication
• ClearAutostart
• ExecuteServicePack
• Update Module
• Write file
• Reboot control
• Change network configuration
2. These files may be retrieved using the Retrieve System Log Files command from the Control menu of
AppManager
3. These files are limited in size to 1 MB. When a log file is about to exceed this size, it is copied to a
backup file (“Log.old” or “PMLog.old”) and a new file is started. Thus, the amount of history that can
be captured is somewhere between 1 MB and 2 MB of ASCII text. This is likely to represent a long
period of use, but there is no easy correlation between the size of the file and the length of the
history. It is recommended to periodically retrieve and store these files with a date-based name to
avoid losing history (see NERC CIP-007 R6.3 and R6.4).
3.6 Protections
Failed attempt limiter –The MicroNet Plus and TMR control prevents automated guessing of passwords
by limiting the number of unsuccessful login attempts in a short period of time. If 12 attempts within a
short period of time are made to login to an account using the wrong password, login access to that
account is disabled for 15 minutes. The actual strategy follows two rules:
• Increment a counter for every unsuccessful login and to decrement it by three every 15 minutes.
While the count exceeds 12, all attempts to login are rejected with a security violation failure.
• Unsuccessful Login attempts from AppManager and SOS count equally. SOS calls the login
routine every time an OPC client passes it credentials, even if SOS already has a connection.
Woodward 13
EC-US-L1
Released
Woodward 15
EC-US-L1
Released
Chapter 4.
Control Firewall
The MicroNet™ Plus controls with SSH encryption have a firewall which disables access to all but the
following ports:
1. The SSH port (22). This port is secure.
a. This port may be used for communicating with the SOS Servlink OPC
Woodward 16
EC-US-L1
Released
Chapter 5.
Application Issues
Woodward 17
EC-US-L1
Released
Chapter 6.
Configuring Your External PC
6.2 PC Firewall
Woodward recommends the following security measures for computers which connect to a MicroNet™
Plus or TMR control:
• Intrusion Detection & Prevention systems
• Proxy servers
• Web filtering software
• Spam control
• IPSec VPN
• Two-factor authentication for Remote Connectivity
• Anti-virus on e-mail gateway, e-mail servers & internet gateway
• WPA2 encryption for wireless control and Wireless Intrusion Prevention
Woodward offers hardened PCs and thin client servers for use as HMI or Engineering Workstations.
Please contact your Woodward representative if you would like a quote on these services.
You can also use the following procedure to disable Remote Desktop; however, if you use the preceding
procedure, the following configuration is overridden:
1. Right-click My Computer and click Properties.
2. Click the Remote tab.
3. In the Remote Desktop section, click to clear Allow users to connect remotely to this computer, and
then click OK.
6.4 NetMeeting
Any PC connected to the MicroNet Plus or TMR control should not run NetMeeting in desktop sharing
mode.
Woodward 18
EC-US-L1
Released
SOS can and should be configured to require each client application to provide login credentials (select
Enable OPC security interface in the Security tab of the Options window). This setting ensures that only
authorized users can gain access to privileged control data and functionality. If this interface is not
required by SOS because of ease-of-use considerations or because a client OPC program does not have
the required credentials interface (see SOS), DCOM security should be hardened to ensure approved
use. As such, Woodward recommends running OPC client applications on the same PC as SOS and
disabling DCOM access to SOS. If it is necessary to remotely connect to SOS, DCOM should be
configured for maximum security.
More information can be found at the following links (links valid as of 2010):
• www.pacontrol.com/OPC.html
• www.opcconnect.com/dcomcnfg.php
• www.controlglobal.com/articles/2010/OPCSecurity1008.html
Woodward 19
EC-US-L1
Released
6.7.2 SOS
Woodward’s SOS Servlink OPC Server is a tool which communicates with a MicroNet Plus control
through a secure TCP channel (SSH). It is used to communicate OPC information (OPC DA (Data
Access) and OPC A&E (Alarms and Events)) to client tools which know how to use it. Example client
tools:
Monitor GAP
• Control Assistant
• Excel spreadsheets
• OPC –Ready HMI applications
6.8 HMI
An HMI is a tool for operating and displaying information from a control. HMI tools which support the OPC
interface can communicate with Woodward controls through the SOS OPC interface. SOS communicates
securely with the control and OPC may be configured to run securely on a PC (see 6.6 Configuring your
External PC / DCOM and OPC). For the most secure configuration, SOS requires that the HMI tool
presents login credentials (see 6.6 Configuring your external PC / DCOM and OPC). If the HMI tool does
not support the IOPCSecurityPrivate interface, it cannot supply credentials to SOS and the Options /
Security page of SOS must be modified to not require credentials (this is not a secure configuration). If
the credentials interface is not active, it is strongly recommended to limit SOS support of DCOM to the
local PC (see 6.6 Configuring your external PC / DCOM and OPC).
Even in a secure configuration, the port used by SOS (the SSH port) can be attacked with data-storms,
causing SOS performance to suffer. For a secure system, all critical control functionality implemented
through SOS (e.g. through the HMI) must have a backup hard-wired replacement like a control panel.
Please consult your Woodward service representative for suggestions about configuring control panels.
For more information about configuring an HMI tool to access SOS values, please consult the Help
document of the SOS tool.
Woodward 20
EC-US-L1
Released
Chapter 7.
Current Versions
The following table contains the current versions of system components and can be used to create a
baseline configuration for configuration management (CM).
These versions and part numbers are subject to change. For the latest versions, consult the Woodward
website at www.woodward.com. The latest software versions are available for download at
www.woodward.com/software/.
Woodward 21
EC-US-L1
Released
Chapter 8.
Patch and Update Rollout Plans
8.3 Notifications
How are users notified if a security issue has been discovered?
When defects or vulnerabilities in Woodward control software are discovered, a corrective action
committee reviews the issue. Typically, the NIST NVD will publish vulnerabilities prior to the availability of
a patch or update. In these cases, or if a third-party component supplier is working to resolve the issue,
the committee will publish a Woodward Application Note to
http://www.woodward.com/searchpublications.aspx. When a patch, update, or mitigation procedure is
available and critical to the correct operation of the control system, the committee will create a service
bulletin. The service bulletin will explain the problem and a suggested course of action and will be
emailed to all Woodward product distributors and customers who have purchased or downloaded the
product directly from Woodward.
How can users ask questions about security or report security issues to Woodward?
Woodward has established a help desk for security-related issues. Please email
questions or reports to [email protected].
Woodward 22
EC-US-L1
Released
Woodward 23
EC-US-L1
Released
Chapter 9.
NERC-CIP v6 Compliance
NERC's mission states that it is to "ensure that the bulk power system in North America is reliable."
NERC has produced a set of directives for ensuring Critical Infrastructure Protection (“CIP”). A complete
specification of NERC CIP requirements can be found by viewing the “Cyber Security” documents at the
following URL: www.nerc.com/pa/Stand/Pages/CIPStandards.aspx.
This section lists all NERC-CIP v6 requirements standards.v6. Requirements applicable to the MicroNet
Plus Cyber Secure solution have been annotated (in brown). The information describes how the
Woodward solution contributes to compliance of the NERC CIP requirements.
NIST Special Publication 800-53 (NIST SP 800-53) Security and Privacy Controls provides information for
Information Systems and Organizations. Chapter 3 of NIST SP 800-53 catalogs security controls and
provides guidance on their application. This reference also defines and classifies common security
controls and appliances. Collectively, the typical Woodward solution with the security appliances and the
recommended configurations meets the NERC-CIP v6 requirements as illustrated in Figure 9 1 NERC-
CIP Coverage Matrix.
CIP-002 CIP-003 CIP-004 CIP-005 CIP-006 CIP-007 CIP-008 CIP-009 CIP-010 CIP-011 CIP-014
BES Cyber System Security Training and Electronic Security Physical Security Systems Security Incident Reporting Recovery Plans for Configuration Information Physical Security
Identification and Management Personnel Security Perimeter Management Management and Response BES Cyber Systems Change Protection
Categorization Controls Planning Mangement and
Vulnerability
Assessments
1. BES Cyber 1. Cyber Security 1. Awareness 1. Electronic 1. Physical Security 1. Port and Services 1. Cyber Security 1. Recovery Plan 1. Configuration 1. Information 1. TO Risk
System Policy for Security Perimeter Plan Incident Response Specification Change Protection Assessment
Identification High/Medium (R1.5)DPI Plan Management (Account Levels)
Systems
2. Regular Approval 2. Cyber Security 2. Training 2. Interactive 2. Visitor Control 2. Security Patch 2. Cyber Security 2. Recovery Plan 2. Configuration 2. BES Cyber Asset 2. TO Risk
Policy for Low Remote Access Program Management Incident Response Implementation Monitoring Reuse and Disposal Verfication
Systems Management Plan and Testing
(Required for IRA) Implementation
3. Identification of 3. Personnel Risk 3. Monitoring 3. Maintenance 3. Malicious Code 3. Cyber Security 3. Recovery Plan 3. Vulnerability 3. Notify TOP
Senior Assessment Electronic Access and Testing Prevention Incident Response Review, Update, Assessments
Management Program Program Plan Review, and
Update, Communication
4. Delgation of 4. Access 4. Cyber 4. Security Event 4. Evaluate Physical
Authority Management Vulnerability Monitoring Attack Threats
Program Assessment
Responsible Entity:
Legend: N/A (End-User) MicroNet CIP Standard
GO/GOP
Configuration CIP Standard
Tofino+Moxa
Dependent (Future)
Woodward 24
EC-US-L1
Released
Note: The Woodward cyber security solution assumes that HMI security is addressed by others. For
example, iFix Security Feature Configuration (v5.1 or newer is recommended) is outside the scope of
this document. Rather, the scope includes the MicroNet Plus control platform (consisting of
Woodward hardware and GAP application software, coder v6.0 or newer) and the associated OPC
and service tool interfaces.
Note: The CIP standard defines functional responsibilities and allocates requirements. The
following table extends these definitions to include Woodward control systems.
1 (CIP-002-5.1a Cyber Security - BES Cyber System Categorization, Attachment 1, Impact Rating Criteria
2016)
1 ((NERC), CIP-002-5.1a Cyber Security - BES Cyber System Categorization, Appendix 1, Section 4
The MicroNet is designed as a High Impact Cyber Asset due to its use by the Control Center to manage
IROLs and perform the functional obligations of the GO.5 The customer, as the Reliability Coordinator,
may specify the criticality of the MicroNet system as configured for the application.
Note: Remedial Action Schemes (previously Special Protection Systems) are N/A to Woodward
automatic generator controls (AGC), AVR, and speed control.6
5 "(CIP-002-5.1a Cyber Security - BES Cyber System Categorization, Attachment 1: High Impact Rating
(H) 1.3 (2.8, 2.10), 1.4 (2.6, 2.9), 2016)
6 (Glossary of Terms Used in NERC Reliability Standards, 2018)
7 "(CIP-002-5.1a Cyber Security - BES Cyber System Categorization, Attachment 1: High Impact Rating
Woodward security controls include both proprietary and commercial-off-the-shelf appliances as well as
software application development practices. The following information may be referenced for more
details on a specific control or appliance. This section, NERC-CIP v6 Compliance, only provides details
on controls as they relate to requirements. The artifacts in Table 1 1 Reference Documents, Manuals, and
Information provide additional details on individual security controls and appliances, such as configuration
and maintenance procedures.
Woodward 27
EC-US-L1
Released
Figure 9 2 EACMS Architecture identifies access points and their associated user roles. A need-based
justification for these user roles can be developed based on the functionality and privileges defined in
Chapter 3.5 Account Levels. It is recommended that Table 3 2 Default Access Control Accounts and
Passwords be updated and maintained to facilitate reconciliation.
Accounts may be deleted using the AppManager tool and performing “Administer Accounts” in the Control
menu. There is no explicit feature for disabling an account.
Refer to the information and references listed in CIP-4 R4.2 Reconcile EACMS and PACS Authorized
Accounts
Woodward 28
EC-US-L1
Released
CIP-4 R5.1 Process to Remove EACMS and PACS Access Abilities Upon Termination – High
Impact and Medium Impact
CIP-4 R5.2 Revoke EACMS and PACS Account(s) Upon Reassignment/Transfer – High Impact and
Medium Impact
CIP-4 R5.3Revoke EACMS and PACS Information Account(s) Upon Termination - High Impact and
Medium Impact
8 Only bi-directional connections are classified as ERC per the NERC CIP definition.
Woodward 30
EC-US-L1
Released
Figure 9 2 EACMS Architecture defines a typical ESP which contains all PCAs and devices of a
Woodward control system.
CIP-5.1.2 Electronic Access Points shall be identified for all ERCs - High Impact and Medium
Impact
The possible Electronic Access Points to a MicroNet Plus or TMR control platform are identified in Figure
9 2 EACMS Architecture and in Table 3 1 Access Points and SIEM Log Files. The associated network
ports are also listed in Table 9 2 Port Map for Routable Protocols in the top-level section of CIP-4
Electronic Security Perimeter (v5).
Details of the functionality, justification, and security of these Access Points is provided in CIP-4 R1.3.
CIP-5.1.3 Justify access for Inbound and Outbound EAPs and deny all others by default – High
Impact and Medium Impact
As discussed in CIP-4 R1.2, EAPs are primarily used by legitimate OPC clients and for specific GAP
application functionality. A comprehensive list of Electronic Access Points to a MicroNet Plus Cyber
Secure control platform are identified in Figure 9 2 EACMS Architecture and in Table 3 1 Access Points
and SIEM Log Files. Several security controls are deployed to deny access by default. Boundary Controls
and Network Security Controls for these Access Points, such as firewalls and router policies, are
discussed in Chapter 4 Control Firewall. Specifically, the policies addressed in CIP-4 R1.3 and CIP-9
R1.1.4 are enforced by these network controls for the ports listed in Table 9 2 Port Map for Routable
Protocols of section CIP-4 Electronic Security Perimeter (v5).
Authorized OPC Client connections utilize the SSH port of the MicroNet Plus Cyber Secure control and
require submission of appropriate credentials as described in CIP-4 R1.2. No functionality is enabled until
the credentials are verified. Data and services are only provided if the credentials match an account
configured with a sufficient security level. Security Levels are defined in section 3.5 Account Levels and
provide a hierarchy of functionality which can be used as a basis to manage and justify access for
individual user accounts. Additionally, the --1511 and -1521 CPUs include a firewall which prevents all
other ports from being accessed unless they are configured by the GAP application.
Securing OPC interfaces begins with the configuration of the GAP application as well as the SOS Servlink
OPC Server. First, the GAP Programmer Block Help – Security describes how the GAP application
configures the authority to access content and services via security levels. Second, the SOS Servlink
OPC Server Help – Security Options describes how the recommended Enable OPC Security Interface
setting can be used to require credentials for OPC client sessions. Once configured as recommended,
tools such as Control Assistant and AppManager will be prompted and required to enter credentials. This
is described further in Control Assistant Help – OPC Server Logon Dialog and AppManager Help –
Secure Login. Also see Frequently Asked Questions: Why is the security level required for Stopping or
Starting an application in AppManager not necessarily the same as the level required to Shutdown or
Reset an application through an OPC client tool which uses SOS?
Woodward 31
EC-US-L1
Released
First, the credentials of the SOS Servlink OPC program should be configured as recommended in
Chapter 3.4 Achieving a Secure Environment. These credentials are passed from the OPC program,
through DCOM, and then verified by the MicroNet Plus controller. Second, it is important to configure
DCOM remote connection on the host/personal computer and the SOS Servlink settings per the
recommendations in Chapter 6 Configuring Your External PC, section 6.6 DCOM and OPC. These
settings are independent of the Woodard security system.
It is common for the GAP application to require UDP communications, such as for Modbus and/or EGD
protocols. If the application configures and opens such ports, they are not secured. As such, sensitive
information and critical functionality should not be implemented through these services (see Chapter 4,
Control Firewall). Woodward software application development practices also include a configuration
check of the communication ports enabled by the GAP application as described in CIP-6 R1.2.
The controls and techniques described in CIP-6 R1.2 Protect unnecessary and unused ports and services
can also be used as an additional layer of protection to deny access and protect EAPs.
The MicroNet Plus and TMR controls do not have a standard dial-up interface.
If using the optional Remote Access kit, please refer to the RemoteAccess manual for ensuring that the
Electronic Security Perimeter remains secure.
The following security control(s) provide mitigation and protection measures for malicious
communications. Only Deep Packet Inspection (DPI) and unauthorized asset discovery controls are listed
here. General firewall, encryption, and network controls are addressed in CIP-4 R1.3 and CIP-9 R1.1.4.
Woodward 32
EC-US-L1
Released
Enabling RADIUS in the Windows Server 2012R2 OS is available to meet multi-factor authentication
requirements when combined with the authentication and access controls described in CIP-4 R1.3.
CIP-5.2.4 Methods for determining active vendor (Interactive) Remote Access sessions
This requirement is part of CIP-005 (v6) which is pending regulatory approval and currently not subject to
enforcement. The MicroNet maintains a log file, PMLog.txt, which contains all successful (and
unsuccessful) account logins. Additional information for this and the Log.txt file is provided in section 3.6
History.
This requirement is part of CIP-005 (v6) which is pending regulatory approval and currently not subject to
enforcement.
MicroNet remote access can be disabled either by physically isolating the control system from the
network or by configuration of Woodward’s SOS Servlink OPC Server. The procedure for disabling SOS
Servlink is provided in Chapter 6 Configuring Your External PC, section 6.6 DCOM and OPC.
Details of the functionality, justification, and security of Remote Access Points is provided in CIP-4 R1.3.
All authorized and unauthorized access attempts on MicroNet systems with secure passwords are logged
to a tamper-proof file on the control. If too many unsuccessful attempts are made to connect to an
account, access to that account will be temporarily disabled (see 3.5 Password Manager Configuration /
Protections).
Woodward 33
EC-US-L1
Released
CIP-7 R1.1 Only Enable Necessary physical I/O Ports and Services
Port Locks/Labels are available as an additional layer of physical protection for RJ45 and USB ports.
Electronic and configurable protection is discussed in CIP-7 R1.2 Protect unnecessary and unused ports
and services
Woodward software application development practices include an automated configuration check of GAP
applications. The purpose is to enumerate all configurable ports, services, and authorized security level
settings. The following are among the tests and scans included.
• Auto-Configuration Analysis which performs a configuration check of the security levels enabled by
the GAP application. User Blocks are identified, and their configuration settings are evaluated against
Woodward coding standards.
o Also see GAP Programmer Block Help: SYS_INFO, SERVLINK, SIO_PORT, HMI_PT,
HMI_ENUM, PASSWORD, QUICKCONF, QUICKSERV, Security, and SOS Servlink OPC Server
Note: The SOS Servlink OPC Server permits client access to control registers. The authority to
read/write and execute commands via OPC is configured and managed by the GAP application. The
justification and security configuration of SOS Servlink is discussed in CIP-4 R1.3.
Note: Configuring iFix security features is not considered within this document.
The Tofino Xenon Enforcer LSM (Modbus) may require firmware updates. A customer account and
License Activation Key is required to search for updates. Login to Tofino-Hirschmann Support and select
the Software and Security Profiles to obtain updates.
Additional security appliances may be integrated in order to interface with known vulnerabilities managed
by the National Vulnerability Database (NVD). These appliances typically utilize the NIST Security
Content Automation Protocol (SCAP) protocol intended to meet NIST-IR-7511 and provide functionality
which allows standardization and automation of security information communication between both
humans and devices. The vulnerabilities listed in the log files of these additional appliances can be
evaluated by the responsible entity to help identify potential patches and updates.
Also see Table 1 1 Reference Documents, Manuals, and Information for additional information on default
policies and maintenance procedures for these security controls and devices.
Woodward 34
EC-US-L1
Released
The Woodward Secure Development Lifecycle (SDLC) is most closely aligned with Capability maturity
Model Integration (CMMI) Level 3. Traceability is maintained between a requirements management and
integrated product specification.
Integrated project management, organizational training on GAP development, employee/contractor
background checks, and physical/logical security controls provide governance of coding standards and
quality/test procedures. These measures are designed to help prevent the introduction of malicious code
prior to the delivery.
File Checksums are generated for GAP application files and service tools can be used to verify the
software integrity. Cyber Secure CPU systems also follow secure boot procedures and help prevent
malicious code or compromised applications from executing after power-cycles.
The MicroNet control provides historical lists of activity for all accounts. Actions, dates and account
names are stored. It is possible to collate these lists in order of individual accounts in order to ascertain
individual account history. The events which are stored include (see section 3.6 History)
• Login / Logout
• Add Account, Remove Account, Change Password
• Start Application / Stop Application / Disable Autostart of Application / Reboot control
• Administer Module Service Pack
• Administer Control Service Pack
• Write or Delete file
• Change network configuration
The Tofino Xenon has a configurable cut-off level {0-7} which filters the recorded events by priority. Level
1 records only Emergency and Alert priority events while Level 7 will record all possible events. Level 2
events are considered Critical and indicate possible changes to the firewall operation. Level 2 events are
also triggered when new configurations are loaded and can be used for CIP-9 R2 Configuration
Monitoring.
Woodward 35
EC-US-L1
Released
Firewall and DPI events considered to be cyber security incidents include detection of unknown network
IP addresses and traffic other than the ports, protocols, and directions specified in Table 9 2 Port Map for
Routable Protocols. The standard configuration will trigger an alarm/alert on these conditions and record
each event in the SIEM log file.
Refer to Table 3 1 Access Points and SIEM Log Files in Chapter 3 System Access for details on all
Access Points.
Default Accounts
All default accounts and passwords are identified in Table 3 2 Default Access Control Accounts and
Passwords in Chapter 3 System Access also contains important account management information for
meeting the requirements of CIP-4 R4.2 Reconcile EACMS and PACS Authorized Accounts
The only protection for shared accounts is to keep the password secret from users who do not require it.
If the password becomes too widely known, it is recommended that an Administrator change the
password. Woodward also recommends changing all default passwords because some accounts may be
configured to have a high level of authority and the default passwords are public information.
Woodward 36
EC-US-L1
Released
Refer to the information and references listed in CIP-4 R4.2 Reconcile EACMS and PACS Authorized
Accounts
The Administrator may configure an account password to expire. If this account is given a “Fixed
Password”, it is the responsibility of the Administrator to change the password when it has expired. If the
account does not have a fixed password, the user who logs in with that account will be prompted to enter
a new password upon expiration of the old one (see Chapter 3.8 Changing User Passwords).
Woodward 37
EC-US-L1
Released
Note: the process and procedures of CIP-9 R1.5 Preserve Diagnostic Data should be performed
prior to resetting all compromised accounts.
Woodward 38
EC-US-L1
Released
See Table 7 1 Baseline Configuration Versions for a list of current versions by type.
CIP-10 R1.2.1 Log files listed in Table 3 1 Access Points and SIEM Log Files may also record
configuration change events. For example, the MicroNet control records network configuration
changes in the Log.txt file.
Note: The addition of new devices, security controls/appliances or any configuration change will
likely impact other security components. For new devices or services, consider possible impacts to
Figure 9 2 EACMS Architecture and Table 9 2 Port Map for Routable Protocols. It may also be
necessary to update policies and configuration management monitoring appliances
For new services and communication ports, consider changes to the Tofino Xenon firewall policies.
The Woodward Tofino manual lists sources for additional information on implementing necessary
changes. For changes to user accounts, consider performing the procedures listed in CIP-4 R4.2
Reconcile EACMS and PACS Authorized Accounts.
Woodward 39
EC-US-L1
Released
The event logs in CIP-7 R4.1 and the alert logs in CIP-7 R4.2 are available for audits by the responsible
entity.
Note: With the USB port disabled, the Tofino Xenon log files can only be retrieved via the Tofino
Configurator in Table 3 1 Access Points and SIEM Log Files or via a remote syslog server.
Woodward 40
EC-US-L1
Released
Woodward 41
EC-US-L1
Released
Chapter 10
Frequently Asked Questions
What are the mechanisms (URLs, email lists, or individual names if need be) through which
security patches are announced and distributed?
• Woodward maintains a list of customers who have purchased controls or downloaded software.
Through the Woodward Service Bulletin distribution procedure, customers are notified of patches
and how and why to implement them.
What is the status of vendor support (supported, end of sale, end of life, etc.)?
• Supported
Is AV (anti-virus) supported?
• Anti-virus software is not supported on the MicroNet control. Real-time performance of the
controller could be compromised by anti-virus activity. However, it is very unlikely that a virus
could infect a MicroNet Control, because the only applications which a user runs on a MicroNet
system are control applications generated by Woodward software. Furthermore, customers are
discouraged from storing any files unrelated to control requirements on the MicroNet Plus or TMR
control.
Woodward 42
EC-US-L1
Released
Why is the security level required for Stopping or Starting an application in AppManager not
necessarily the same as the level required to Shutdown or Reset an application through an OPC
client tool which uses SOS Servlink?
• The security levels used to control AppManager (“Vx-Service”) functionality like Stop and Start
are required to be available whether or not an application is running on the control. These values
are fixed.
• The application can set the SOS Servlink security levels in the SYS_INFO block (consult “Block
Help” in the GAP Editor program). These security levels, as defined in the running application,
may be different from the fixed AppManager levels (see Chapter 3.3 Password Manager Default
Settings and 3.5 Account Levels).
Woodward 43
EC-US-L1
Released
How can I use the Datalog Retrieval Tool functionality in AppManager without storing login
credentials on the PC?
• This is not possible. Datalog functionality requires credentials to communicate with MicroNet Plus
Cyber Secure controls. It is suggested to use an account with low authority for this purpose (e.g.
the default “Datalog” account). The account must have an authority level of at least “1” in order to
read files. The password is cached in an encrypted form in the registry, so it is not possible to re-
use this information to gain access to the control for another purpose.
Woodward 44
EC-US-L1
Released
Chapter 11.
Product Support and Service Options
OEM or Packager Support: Many Woodward controls and control devices are installed into the equipment
system and programmed by an Original Equipment Manufacturer (OEM) or Equipment Packager at their
factory. In some cases, the programming is password-protected by the OEM or packager, and they are the
best source for product service and support. Warranty service for Woodward products shipped with an
equipment system should also be handled through the OEM or Packager. Please review your equipment
system documentation for details.
Woodward Business Partner Support: Woodward works with and supports a global network of
independent business partners whose mission is to serve the users of Woodward controls, as described
here:
• A Full-Service Distributor has the primary responsibility for sales, service, system integration
solutions, technical desk support, and aftermarket marketing of standard Woodward products within
a specific geographic area and market segment.
• An Authorized Independent Service Facility (AISF) provides authorized service that includes repairs,
repair parts, and warranty service on Woodward's behalf. Service (not new unit sales) is an AISF's
primary mission.
Woodward 45
EC-US-L1
Released
This option allows you to call your Full-Service Distributor in the event of an unexpected outage, or in
advance of a scheduled outage, to request a replacement control unit. If the unit is available at the time of
the call, it can usually be shipped out within 24 hours. You replace your field control unit with the like-new
replacement and return the field unit to the Full-Service Distributor.
Charges for the Replacement/Exchange service are based on a flat rate plus shipping expenses. You are
invoiced the flat rate replacement/exchange charge plus a core charge at the time the replacement unit is
shipped. If the core (field unit) is returned within 60 days, a credit for the core charge will be issued.
Flat Rate Repair: Flat Rate Repair is available for most standard products in the field. This program
offers you repair service for your products with the advantage of knowing in advance what the cost will
be. All repair work carries the standard Woodward service warranty 5-01-1205 North American Terms
and Conditions of Sale (Industrial Business Segment) on replaced parts and labor.
Flat Rate Remanufacture: Flat Rate Remanufacture is very similar to the Flat Rate Repair option with
the exception that the unit will be returned to you in “like-new” condition and carry with it the full standard
Woodward product warranty 5-01-1205 North American Terms and Conditions of Sale (Industrial
Business Segment). This option is applicable to mechanical products only.
For instructions about sending your MicroNet control to Woodward for repairs, please consult your
product manual. It is suggested that you change the password of the Administrator account to the default
value (“Admin@1”) before sending it to Woodward. This will make it possible for Woodward to make
appropriate changes to your control without removing your account configuration.
If you do not provide Administrator account credentials to Woodward for performing the work, Woodward
will return the Password Manager configuration to the default configuration (see 3.1 Password Manager
Configuration / Using Default Settings). It will be your responsibility to reconfigure the accounts to a
secure and appropriate configuration. When shipping the item(s), attach a tag with the following
information:
Packing a Control
Use the following materials when returning a complete control:
• Protective caps on any connectors
• Antistatic protective bags on all electronic modules
• Packing materials that will not damage the surface of the unit
• At least 100 mm (4 inches) of tightly packed, industry-approved packing material
• A packing carton with double walls
• A strong tape around the outside of the carton for increased strength
Woodward 46
EC-US-L1
Released
Replacement Parts
When ordering replacement parts for controls, include the following information:
• The part number(s) (XXXX-XXXX) that is on the enclosure nameplate
• The unit serial number, which is also on the nameplate
Engineering Services
Woodward offers various Engineering Services for our products. For these services, you can contact us by
telephone, by email, or through the Woodward website.
• Technical Support
• Product Training
• Field Service
Technical Support is available from your equipment system supplier, your local Full-Service Distributor, or
from many of Woodward’s worldwide locations, depending upon the product and application. This service can
assist you with technical questions or problem solving during the normal business hours of the Woodward
location you contact. Emergency assistance is also available during non-business hours by phoning
Woodward and stating the urgency of your problem.
Product Training is available as standard classes at many of our worldwide locations. We also offer
customized classes, which can be tailored to your needs and can be held at one of our locations or at
your site. This training, conducted by experienced personnel, will assure that you will be able to maintain
system reliability and availability.
Field Service engineering on-site support is available, depending on the product and location, from many
of our worldwide locations or from one of our Full-Service Distributors. The field engineers are
experienced both on Woodward products as well as on much of the non-Woodward equipment with which
our products interface.
For information on these services, please contact us via telephone, email us, or use our website:
www.woodward.com.
Woodward 47
EC-US-L1
Released
You can also contact the Woodward Customer Service Department at one of the following Woodward
facilities to obtain the address and phone number of the nearest facility at which you can obtain
information and service.
Woodward 48
EC-US-L1
Released
Technical Assistance
If you need to contact technical assistance, you will need to provide the following information. Please
write it down here before contacting the Engine OEM, the Packager, a Woodward Business Partner, or
the Woodward factory:
General
Your Name
Site Location
Phone Number
Fax Number
Serial Number
Control/Governor #2
Serial Number
Control/Governor #3
Serial Number
Symptoms
Description
If you have an electronic or programmable control, please have the adjustment setting positions or the
menu settings written down and with you at the time of the call.
Woodward 49
EC-US-L1
Released
Glossary
Acronym/Term Definition/Description
BES Bulk Electric System
CSC Critical Security Controls
DFARS Defense Federal Acquisition Regulation Supplement
EACMS Electronic Access Control or Monitoring System: firewalls, authentication
servers, log monitoring, alerting/alarming systems
EAP Electronic Access Point: a Cyber Asset interface that allows routable
communications across the ESP
ERC External Routable Connectivity: remote access to a Cyber Asset from
outside the ESP via a bi-directional protocol
ESP Electronic Security Perimeter: The logical border surrounding a network to
which BES Cyber Systems are connected using a routable protocol.
GO Generator Owner
GOP Generator Operator
IRA Interactive Remote Access: User-initiated access via a remote client using a
routable protocol and originates from a Cyber Asset outside the ESP
IS Intermediate System: One or more Cyber Assets outside the ESP performing
access control for Interactive Remote Access which utilizes data encryption
to/from the EAP
PACS Physical Access Control System: applicable to External Routable
Connectivity
PCA Protected Cyber Asset: programmable electronic device including hardware,
software, and data
PSP Physical Security Perimeter
SIEM Security Information and Event Management
UFLS Under Frequency Load Shedding
UVLS Under Voltage Load Shedding
VRF Violation Risk Factor
Achilles GE Digital’s Achilles Communication Certification (ACC)tests the control for
robustness and cyber security for attack vectors utilizing Ethernet
communications ports. Specific CPUs have been certified to the Achilles
standards as indicated in Chapter 7
Administrator Administrator is the most privileged account on the MicroNet Plus
Cyber Secure control. There may be only one Administrator account, and its
name is “Administrator”. Its password is known and may be managed only by
the people given the role of Administrator.
AppManager Woodward’s AppManager program is the user interface for managing
applications and configuring security accounts on the control.
CIP The Critical Infrastructure Protection program (CIP) coordinates all of
NERC’s efforts to improve physical and cyber security for the bulk power
system of North America as it relates to reliability. These efforts include
standards development, compliance enforcement, assessments of risk and
preparedness, disseminating critical information via alerts to industry, and
raising awareness of key issues. Additionally, the program monitors the bulk
power system to provide real-time situation awareness leadership and
coordination services to the electric industry.
Control Assistant Woodward’s Control Assistant is a tool for service access to a control. It may
be used to view and modify control parameters, graphically view data trends
and stored data log files.
Woodward 50
EC-US-L1
Released
Woodward 51
EC-US-L1
Released
Woodward 52
EC-US-L1
Released
Revision History
Changes in Revision C—
• Added MicroNet™ TMR to the manual
• Added content to the first two paragraphs in Chapter 1
• Added MicroNet™ TMR to Tables 1-1 and 1-2
• Added Woodward DID Recommendations to Chapter 2
• Edited headings in Table 3-2
• Edited heading in paragraph 5 in Section 3.5
• Edited heading in paragraph 1 in Section 3.6
• Edited first paragraph in Section 3.7
• Edited first paragraph in Chapter 4
• Added first bullet and edited second bullet in Section 5.1
• Edited Sections 6.1, 6.2, 6.4, and 6.7
• Multiple edits in Table 7-1
• Edited Section 8.2
• Edited Notice Box in Chapter 9
• Edited Table 9-1 and added TMR references within Chapter 9
• Added CIP-13 Supply Chain Security to Chapter 9
Changes in Revision B —
• Updated NERC CIP Compliance to v6
• Added related documents for new cyber security appliances MOXA EDR-810 and Tofino Xenon
• Moved Chapter 2 Definitions and Abbreviations to the Glossary and appended new entries
• Added Chapter 2 Defense-in-Depth (DiD)
• Expanded Chapter 3 to the broader subject of System Access and added
o Table 3 1 Access Points and SIEM Log Files
o Table 3 2 Default Access Control Accounts and Passwords
• Added new security appliances to Chapter 7 Current Versions
• Added NIST NVD to section 8.3 Notifications
• Moved Chapter 8.4 Warranty Repair to new Chapter 11 Product Support and Service Options
• Revised CIP-2 to reflect new NERC CIP categorizations by impact rating
• Added Revision History
• Added References
Woodward 53
EC-US-L1
Released
References
(NERC), N. A. (2016, 12 14). CIP-002-5.1a Cyber Security - BES Cyber System Categorization, Appendix
1, Section 4 Scope of Applicability. Retrieved from (CIP) Critical Infrastructure Protection -
Subject to Enforcement: http://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx
(NERC), N. A. (2016, 12 14). CIP-002-5.1a Cyber Security - BES Cyber System Categorization,
Attachment 1, Impact Rating Criteria. Retrieved from (CIP) Critical Infrastructure Protection -
Subject to Enforcement: http://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx
(NERC), N. A. (2016, 12 14). CIP-002-5.1a Cyber Security - BES Cyber System Categorization,
Attachment 1: High Impact Rating (H) 1.3 (2.8, 2.10), 1.4 (2.6, 2.9). Retrieved from (CIP) Critical
Infrastructure Protection - Subject to Enforcement:
http://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx
(NERC), N. A. (2018, 1 31). Glossary of Terms Used in NERC Reliability Standards. Retrieved from
NERC Glossary of Terms:
http://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf
Woodward 54
EC-US-L1
Released
ÌB26479è:èCµ¹ º¹Î
Woodward has company-owned plants, subsidiaries, and branches, as well as authorized distributors and other
authorized service and sales facilities throughout the world.
Complete address / phone / fax / email information for all locations is available on our website.
EC-US-L1