PLC Tutorials

#13 PLC Best Practices – Disable Unused Communication Ports

PLC controllers and network interface modules generally support multiple communication protocols that are enabled by default. Disable ports and protocols that are not required for the application.

Security ObjectiveTarget Group
HardeningIntegration / Maintenance Service Provider

Disable Unused Communication Ports in PLC

Common protocols usually enabled by default are e.g., HTTP, HTTPS, SNMP, Telnet, FTP, MODBUS, PROFIBUS, EtherNet/IP, ICMP, etc.

The best practice is to develop a data flow diagram that depicts the required communications between the PLC and other components in the system.

The data flow diagram should show both the physical ports on the PLC as well as the logical networks they are connected to. For each physical port, a list of required network protocols should be identified and all others disabled.

memory types in siemens plc

Example

For example, many PLCs include an embedded web server for maintenance and troubleshooting. If this feature will not be used, if possible, it should be disabled as this could be an attack vector.

Why?

Beneficial for…?Why?
SecurityEvery enabled port and protocol adds to the PLC’s potential attack surface. The easiest way to make sure an attacker can’t use them for unauthorized communication is to disable them altogether.
  ReliabilityIf a PLC cannot communicate via a certain port or protocol, this also reduces the potential amount of (malformed) traffic, be it malicious or not, which decreases the chances of the PLC crashing because of unintended/malformed communication packages.
MaintenanceDisabling unused ports and protocols also facilitate maintenance, because it reduces the PLC’s overall complexity. What’s not there does not need to be administrated or updated.

References

Standard/frameworkMapping
MITRE ATT&CK for ICSTactic: TA005 – Discovery
Technique: T0808 – Control Device Identification, T0841 – Network Service Scanning, T0854 – Serial Connection Enumeration
ISA 62443-3-3SR 7.6: Network and security configuration settings
SR 7.7: Least functionality
ISA 62443-4-2EDR 2.13: Use of physical diagnostic and test interfaces
ISA 62443-4-1SD-4: Secure design best practices
SI-1: Security implementation review
SVV-1: Security requirements testing

Source: PLC Security

You've successfully subscribed !
Share

Recent Articles

  • PLC Tutorials

PLC Panel and MCC Panel Interface Signals

The PLC panel and MCC panel interface signals are start, stop, run feedback, trip, local…

5 days ago
  • PLC Tutorials

Shutter Door Control using Motor and Limit Switches

 In this article, we are going to discuss about shutter door control using induction motor…

7 days ago
  • Electrical Basics

Electrical Drives – Modes, Types, Speed Control Applications

Electrical Drives control the motion of electric motors. Motion control is required in industrial and…

7 days ago
  • PLC Tutorials

PLC Ladder Logic Design: Control 3 Motors with Toggle Switch

PLC ladder logic design to control 3 motors with toggle switch and explain the program…

3 weeks ago
  • PLC Tutorials

VFD Simulator Download – Free Yaskawa V1000 Software

VFD simulator download: Master the online tool from the Yaskawa V1000 & programming software for…

7 days ago
  • PLC Tutorials

Conveyor Sorting Machine PLC Program with Calculation Function

The conveyor sorting machine is widely used in the packing industries using the PLC program…

12 hours ago