Inst ToolsInst ToolsInst Tools
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
  • Request
Search
  • Books
  • Software
  • Projects
  • Process
  • Tools
  • Basics
  • Formula
  • Power Plant
  • Root Cause Analysis
  • Electrical Basics
  • Animation
  • Standards
  • 4-20 mA Course
  • Siemens PLC Course
Reading: #10 PLC Best Practices – Assign Register Blocks by Function
Share
Font ResizerAa
Inst ToolsInst Tools
Font ResizerAa
  • Courses
  • Design
  • PLC
  • Interview
  • Control System
Search
  • Courses
  • Automation
    • PLC
    • Control System
    • Safety System
    • Communication
    • Fire & Gas System
  • Instrumentation
    • Design
    • Pressure
    • Temperature
    • Flow
    • Level
    • Vibration
    • Analyzer
    • Control Valve
    • Switch
    • Calibration
    • Erection & Commissioning
  • Interview
    • Instrumentation
    • Electrical
    • Electronics
    • Practical
  • Q&A
    • Instrumentation
    • Control System
    • Electrical
    • Electronics
    • Analog Electronics
    • Digital Electronics
    • Power Electronics
    • Microprocessor
  • Request
Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Inst Tools > Blog > PLC Tutorials > #10 PLC Best Practices – Assign Register Blocks by Function

#10 PLC Best Practices – Assign Register Blocks by Function

Assign designated register blocks for specific PLC functions in order to validate data and block unauthorized access to controller data.

Last updated: September 21, 2021 11:26 pm
Editorial Staff
PLC Tutorials
No Comments
Share
7 Min Read
SHARE

Assign designated register blocks for specific functions in order to validate data, avoid buffer overflows and block unauthorized external writes to protect controller data.

Contents
Assign Register blocks by Function in PLCBackgroundExample
Security ObjectiveTarget Group
The integrity of PLC variablesProduct Supplier Integration / Maintenance Service Provider

Assign Register blocks by Function in PLC

Temporary memory, also known as scratch-pad memory, is an easily exploitable area of memory if this practice is not followed. e.g., simply writing to a “Modbus” register that is out of bounds could lead to overwriting memory registers used for temporary calculations.

Generally, register memory can be accessed by other devices across the PLC network for read and write operations. Some registers could be read by an HMI, and others could be written by a SCADA system, etc.

Having specific register arrays for a certain application also makes it easier (in the controller or an external firewall is used) to configure Read-only access from another device/HMI.

Examples of functions for which designated register blocks make sense are:

  • reading
  • writing (from HMI / Controller / other external device)
  • validating writes
  • calculations

Ensuring external writes to allowable registers also helps in avoiding main memory reset errors either due to out-of-bound execution or malicious attempts.

These designated register blocks can be used as buffers for I/O, timer, and counter writes by validating that the buffer is completely written (does not contain part old, part new data) and validating all the data in the buffer.

Background

Main memory and register memory are used differently. Main memory is used for storing currently executing program logic whereas the register memory is used as a temporary memory by the currently executing logic.

Though register memory is a temporary one, since it is being used by the executing logic it is bound to contain some important variables that would affect the main logic.

Example

Examples for what could happen if this practice is not implemented:

(Reference: G. P. H. Sandaruwan, P. S. Ranaweera, Vladimir A. Oleshchuk, PLC Security and Critical Infrastructure Protection):

Siemens typically uses the scratchpad memory in the flag area from flag 200.0 to flag 255.7. If a bit is changed within this area there is a likelihood of a serious malfunction of the PLC based on the importance of that bit or byte.

Assume that an attacker can gain access to one of the machines in the PLC network and infect that machine with a worm which is capable of writing arbitrary values to the register memory. Since the register memory values changed arbitrarily, it can change the pressure value.

Executing logic will set a new value based on the change and that may cause the system to exceed its safety margins and possibly be driven to a failure.

Examples for implementing this practice:

In a scenario where there is a safety zone (but the DCS can read), the firewall can log any “write’ attempts with a rule that these registers are READ ONLY in the safety zone.

In another scenario, there could be some write-capable registers, and others are read-only, but having all the READ ONLY registers in a single array makes it easier to configure them in the controller (or a firewall).

Why?

Beneficial for…?Why?
              SecurityMakes it easier to protect the controller data by function (read/write/validate). Makes it easier for protocol-sensitive firewalls to do their job:

The rules get simpler because it is very clear what register blocks are allowed for the HMI to access. Makes it easier to manage the (simpler) rules in the firewall.

Making unauthorized changes to internal temporary memory is an easily exploitable vulnerability (By-pass Logic Attack).

When inputs and outputs to PLC routines are properly validated, any changes (by a malicious actor or by mistake) can be caught easily instead of staying in the logic sequence for long and throwing errors / causing issues later in execution.
        ReliabilityMakes reads and writes go faster because the number of transactions is reduced. Even authorized changes and programming mistakes can cause a malfunction if temporary memory is not protected.

Network and communications errors on long messages can result in unintended errors if the validity of the data is not checked prior to processing.
  MaintenanceProgramming mistakes causing writing to temporary memory can make it hard to find errors, so the problem can be avoided by assigning specific registers for writes.

References

Standard/frameworkMapping
MITRE ATT&CK for ICSTactic: TA009 – Inhibit Response Function,  TA010 – Impair Process Control
Technique:  T0835 – Manipulate I/O image, T0836 – Modify Parameter
  ISA 62443-3-3SR 3.4: Software and information integrity
SR 3.5: Input Validation
SR 3.6: Deterministic Output
    ISA 62443-4-1SD-4: Secure design best practices
SI-1: Security implementation review
SI-2: Secure coding standards
SVV-1: Security requirements testing
  ISA 62443-4-2CR 3.4: Software and information integrity
CR 3.5: Input Validation
CR 3.6: Deterministic Output
  MITRE CWECWE-787: Out-of-bounds Write
CWE-653: Insufficient Compartmentalization

Source: PLC Security

Don't Miss Our Updates
Be the first to get exclusive content straight to your email.
We promise not to spam you. You can unsubscribe at any time.
Invalid email address
You've successfully subscribed !

Continue Reading

Timer during Motor Direction Change PLC Program
How to Install GSD File in Step 7 PLC using Simatic Manager?
UPS Selection Factors for a Control System
Types of SCADA System Architecture
Animation of Electromagnetic Relay
How Modbus is used in Industrial Networks?
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link
Share
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

128.3kFollowersLike
69.1kFollowersFollow
210kSubscribersSubscribe
38kFollowersFollow

Categories

Explore More

CX-Programmer Tutorial: 1 Button To Activate 4 Different Machines
Automatic Paper Cutting Machine Using CX-Programmer
PLC Code to Start & Stop Motor and Pump as per Logic
Tools Required for PLC Programmer to Carry at Site
Types of Cables used in Industrial Automation
GET Command – Siemens PLC-to-PLC Communication Project
Node-RED in PLC Industrial Automation
Problem on PLC, HMI, VFD, and Motor Circuit

Keep Learning

SCADA System Vulnerabilities

SCADA System Vulnerabilities

car parking example logic

Up Down Counter Instruction in PLC

Real-time PLC Projects

Real-time PLC Projects – Industrial Automation

Control of Double-acting Pneumatic Cylinder

Ladder Logic for Control of Double-acting Pneumatic Cylinder

Gate Array Logic using PLC

PLC Program to Simulate Gate Array Logic

Why Baud Rate is Important in Modbus Network

Why Baud Rate is Important in Modbus Network?

PID parameters

PID in Siemens TIA Portal

InTouch SCADA Training Course

Free InTouch SCADA Tutorial Course for Beginners

Learn More

Classification of HVAC chillers

Classification of HVAC Chillers

Root Locus Concepts Objective Questions

Construction of Root Loci

DeltaV System Configuration Change and Download - 3

DeltaV System Configuration Changes and Download

Emerson ASCO Solenoid valve references

SIS Solenoid Valves – Safety PLC

Closed Tank Application

Zero Elevation and Zero Suppression in Level Measurement

control of level in three cascaded Loops

Multiple Lags (orders)

Difference Between Modbus TCP IP and Profinet

Difference Between Modbus TCP IP and Profinet

Transistor as Switch in Cut off region

Transistor as a Switch Working Principle

Menu

  • About
  • Privacy Policy
  • Copyright

Quick Links

  • Learn PLC
  • Helping Hand
  • Part Time Job

YouTube Subscribe

Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?