By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Inst ToolsInst ToolsInst Tools
  • Ask
  • Courses
  • Videos
  • Q & A
    • Interview
      • Instrumentation
      • Electronics
      • Electrical
      • Practical Questions
    • MCQ
      • Instrumentation MCQ
      • Electrical MCQ
      • Electronics MCQ
      • Control Systems MCQ
      • Analog Electronics MCQ
      • Digital Electronics MCQ
      • Power Electronics MCQ
      • Microprocessor MCQ
      • Multiple Choice Questions
  • EE
    • Electronics
      • Electronics Q & A
      • Electronic Basics
      • Electronic Devices & Circuits
      • Electronics Animation
      • Digital Electronics
    • Electrical
      • Electrical Basics
      • Electrical Q & A
      • Power Electronics
      • Electrical Machines
      • Electrical Animation
      • Power Systems
      • Switchgear & Protection
      • Transmission & Distribution
  • Measure
    • Control Valves
    • Calibration
    • Temperature
    • Pressure
    • Flow
    • Level
    • Analyzers
    • Switches
    • Vibration
    • Solenoid Valve
  • Control
    • PLC Tutorials
    • Control Systems
    • Safety Instrumented System (SIS)
    • Communication
    • Fire & Gas System
  • More
    • Design
    • Tools
    • Animation
    • Basics
    • Formulas
    • Standards
    • TextBooks
    • Common
    • Software
    • Excel Tools
    • Erection & Commissioning
    • Process Fundamentals
    • Videos
    • Books
Search
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Reading: #14 PLC Best Practices – Restrict Third-party Data Interfaces
Share
Notification Show More
Font ResizerAa
Inst ToolsInst Tools
Font ResizerAa
  • Ask
  • Courses
  • Videos
  • Q & A
  • EE
  • Measure
  • Control
  • More
Search
  • Ask
  • Courses
  • Videos
  • Q & A
    • Interview
    • MCQ
  • EE
    • Electronics
    • Electrical
  • Measure
    • Control Valves
    • Calibration
    • Temperature
    • Pressure
    • Flow
    • Level
    • Analyzers
    • Switches
    • Vibration
    • Solenoid Valve
  • Control
    • PLC Tutorials
    • Control Systems
    • Safety Instrumented System (SIS)
    • Communication
    • Fire & Gas System
  • More
    • Design
    • Tools
    • Animation
    • Basics
    • Formulas
    • Standards
    • TextBooks
    • Common
    • Software
    • Excel Tools
    • Erection & Commissioning
    • Process Fundamentals
    • Videos
    • Books
Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Inst Tools > Blog > PLC Tutorials > #14 PLC Best Practices – Restrict Third-party Data Interfaces

#14 PLC Best Practices – Restrict Third-party Data Interfaces

Restrict the type of PLC connections and available data for third-party data interfaces in a programmable logic controller,

Last updated: September 22, 2021 5:50 pm
Editorial Staff
PLC Tutorials
No Comments
Share
5 Min Read
SHARE

Restrict the type of connections and available data for 3rd party interfaces. The connections and/or data interfaces should be well defined and restricted to only allow read/write capabilities for the required data transfer.

Contents
Restrict Third-party Data Interfaces in PLCExample
Security ObjectiveTarget Group
HardeningIntegration / Maintenance Service Provider

Restrict Third-party Data Interfaces in PLC

In some cases, due to long cable runs or a large exchange of data, interfaced data connections present a better business case than hard-wired data exchange between two separate parties.

The following guidelines should be considered and followed where practical when designing and implementing a third-party data exchange interface:

Use a dedicated communications module, either directly connected to the 3rd party PLC or data exchange equipment or use dedicated network equipment physically segregated from each party’s core network.

The MAC address of connected devices is typically available in system variables for any ICS Ethernet-enabled device, making it possible to verify device identity with a multi-factor approach (IP address + MAC maker code = trusted device).

This practice is certainly not fool-proof, as MAC & IP addresses can be spoofed, but it serves to raise the bar in terms of communications between trusted ICS systems and devices.

When selecting a protocol for 3rd party interfaces, choose a protocol which minimizes the ability of the third party to write data to the owner’s system.

Choose a connection method and connection port which prevents the 3rd party from being able to configure the owner’s PLC or data exchange equipment.

The third-party should not be able to read or write to any data that has not been explicitly defined and made available.

 Use a watchdog timer for monitoring communication so that commands are not sent to a PLC in fault mode.

Serial Connection: Use a dedicated communication module for each 3rd party interface with a restricted array of data. Ensure the owner’s side of the connection is the Initiator and that the third party is the Responder.

Ethernet/IP: Some PLCs allow for communication modules to function as a firewall and can perform Deep Packet Inspection (DPI), or restrict communication module interfaces to limit the data exchange to a predefined subset. If these features are available, and an Ethernet/IP protocol is in use, ensure the features are enabled and configured.

When operational or contractual requirements prevent the owner from accomplishing the previous items, consider using a separate “data concentrator” (aka proxy/DMZ) PLC in order to buffer the data and protect the owner from unwanted writes/programming from the 3rd party. Ensure the backplane of this PLC cannot be traversed from the 3rd party network.

Types of PLC

Example

Pipeline or Lease Automatic Custody Transfer (LACT) units which transfer and meter hydrocarbons or water exchanged between an upstream producing or pipeline company and a midstream pipeline company with network or serial interfaced connections sharing metering, state, and permissive information between companies.

Regional potable water purveyor (importer) sharing turnout water flow rate being delivered to a local municipality’s water plant.

Why?

Beneficial for…?Why?
  Security1. Limit the exposure to 3rd party networks and equipment.

2. Authenticate external devices to prevent spoofing.
  ReliabilityLimits the ability for intentional or unintentional modifications or access from 3rd party locations or equipment.
Maintenance 

References

Standard/frameworkMapping
  MITRE ATT&CK ICSTactic:  TA010 – Impair Process Control
Technique:  T0836 – Modify Parameter
  ISA 62443-3-3SR 7.6: Network and security configuration settings
SR 7.7: Least functionality
  ISA 62443-4-2CR 7.6: Network and security configuration settings
CR 7.7: Least functionality
  ISA 62443-4-1SD-4: Secure design best practices
SI-1: Security implementation review
SVV-1: Security requirements testing

Source: PLC Security

Don't Miss Our Updates
Be the first to get exclusive content straight to your email.
We promise not to spam you. You can unsubscribe at any time.
Invalid email address
You've successfully subscribed !
PLC FBD Programming for Burglar Alarm Security System
Ferrules and Cross Ferruling
What is Process Control?
Example of Automated Guided Vehicle with PLC
Instrumentation Engineer Activities & Documents – Detail Design Phase
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link
Share
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

128.3kFollowersLike
69.1kFollowersFollow
208kSubscribersSubscribe
38kFollowersFollow

Recent Comments

  • MIHARITSOA Aina Sitraka on Top Non-PLC Certification Courses for Automation Professionals
  • Vaishnavi on Free Instrumentation Course for Trainee Engineers
  • anuj kapoor on DCS Program to Maintain Draft in Furnace
  • anuj kapoor on IoT based Smart Boiler Control System with Cloud PLC and SCADA

Related Articles

Types of Failures in Industrial Automation Systems

Types of Failures in Industrial Automation Systems

Sink or source PNP or NPN Normally Open or Normally Closed Input v. output. output

Sink or Source? Normally Open or Normally Closed?

Firmware Version in Siemens PLC

What is the Firmware Version of a PLC? – Siemens PLC Hardware

Step-by-step import export in FactoryTalk View

FactoryTalk View Studio – Import and Export Tutorial

Factory IO PLC Course

Factory I/O PLC Automation Training Course (Free)

PLC Program to Control Level of Two Tanks

PLC Level Control of Two Tanks

Communication Protocols in PLC

Various Communication Protocols in PLC

PLC Program

Example PLC Program

More Articles

Difference-between-pneumatic-electric-hydraulic-actuators

Difference between Pneumatic, Electrical & Hydraulic Actuators

Turbine Bypass System

Turbine Bypass System

Procedure For reading or searching the tag number in Siemens PLC

Procedure for Reading or Searching the Tag number in Siemens PLC

Strain Gauge Pressure Sensor Principle

Strain Gauge Pressure Sensor Principle

Liquid In Glass Thermometers

Liquid In Glass Thermometer Principle

State Variable Analysis and Design

Diagonalization

Technology is Shaping the Future of Education

How Technology is Shaping the Future of Education?

Omron PLC Mixing System

Mixing Program with Timers and Counters in Omron PLC

Follow US
All rights reserved. Reproduction in whole or in part without written permission is prohibited.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?