670 Version 2.2 IEC CSDG
670 Version 2.2 IEC CSDG
670 series
Version 2.2 IEC
Cyber security deployment guideline
Document ID: 1MRK 511 399-UEN
Issued: May 2020
Revision: M
Product version: 2.2
The software and hardware described in this document is furnished under a license and may
be used or disclosed only in accordance with the terms of such license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. (https://www.openssl.org/) This product includes cryptographic software written/
developed by: Eric Young ([email protected]) and Tim Hudson ([email protected]).
Trademarks
ABB and Relion are registered trademarks of the ABB Group. All other brand or product names
mentioned in this document may be trademarks or registered trademarks of their respective
holders.
Warranty
Please inquire about the terms of warranty from your nearest ABB Power Grids representative.
Disclaimer
The products are designed to be connected to and to communicate information and data via a
network interface. It is the user’s sole responsibility to provide and continuously ensure a
secure connection between the product and the user’s network or any other network (as the
case may be). The user shall establish and maintain any appropriate measures (such as but not
limited to the installation of firewalls, application of authentication measures, encryption of
data, installation of anti-virus programs, etc) to protect the product, the network, its system
and the interface against any kind of security breaches, unauthorized access, interference,
intrusion, leakage and/or theft of data or information. ABB Power Grids is not liable for
damages and/or losses related to such security breaches, any unauthorized access,
interference, intrusion, leakage and/or theft of data or information.
The data, examples and diagrams in this manual are included solely for the concept or product
description and are not to be deemed as a statement of guaranteed properties. All persons
responsible for applying the equipment addressed in this manual must satisfy themselves that
each intended application is suitable and acceptable, including that any applicable safety or
other operational requirements are complied with. In particular, any risks in applications where
a system failure and/or product failure would create a risk for harm to property or persons
(including but not limited to personal injuries or death) shall be the sole responsibility of the
person or entity applying the equipment, and those so responsible are hereby requested to
ensure that all measures are taken to exclude or mitigate such risks.
This document has been carefully checked by ABB Power Grids but deviations cannot be
completely ruled out. In case any errors are detected, the reader is kindly requested to notify
the manufacturer. Other than under explicit contractual commitments, in no event shall ABB
Power Grids be responsible or liable for any loss or damage resulting from the use of this
manual or the application of the equipment.
Conformity
This product complies with the directive of the Council of the European Communities on the
approximation of the laws of the Member States relating to electromagnetic compatibility
(EMC Directive 2004/108/EC) and concerning electrical equipment for use within specified
voltage limits (Low-voltage directive 2006/95/EC). This conformity is the result of tests
conducted by ABB in accordance with the product standard EN 60255-26 for the EMC directive,
and with the product standards EN 60255-1 and EN 60255-27 for the low voltage directive. The
product is designed in accordance with the international standards of the IEC 60255 series.
Table of contents
Table of contents
Section 1 Introduction.................................................................................................... 5
1.1 This manual....................................................................................................................................5
1.2 Intended audience........................................................................................................................5
1.3 Product documentation.............................................................................................................. 5
1.3.1 Product documentation set..................................................................................................... 5
1.3.2 Document revision history....................................................................................................... 6
1.4 Document symbols and conventions....................................................................................... 7
1.4.1 Symbols........................................................................................................................................ 7
1.4.2 Document conventions............................................................................................................. 7
670 series 1
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Table of contents
2 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Table of contents
670 series 3
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
4
1MRK 511 399-UEN M Section 1
Introduction
Section 1 Introduction
1.1 This manual GUID-818ABF52-5D9F-4E38-A3EF-721301052367 v1
The cyber security deployment guideline describes the process for handling cyber security
when communicating with the IED. Certification, Authorization with role based access control,
and product engineering for cyber security related events are described and sorted by
function.
This guideline is intended for the system engineering, commissioning, operation and
maintenance personnel handling cyber security during the engineering, installation and
commissioning phases, and during normal service.
The personnel is expected to have general knowledge about topics related to cyber security.
Decommissioning
Commissioning
Maintenance
Engineering
Operation
Installing
Engineering manual
Installation manual
Commissioning manual
Operation manual
Application manual
Technical manual
Communication
protocol manual
Cyber security
deployment guideline
IEC07000220-4-en.vsd
IEC07000220 V4 EN-US
670 series 5
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 1 1MRK 511 399-UEN M
Introduction
The engineering manual contains instructions on how to engineer the IEDs using the various
tools available within the PCM600 software. The manual provides instructions on how to set
up a PCM600 project and insert IEDs to the project structure. The manual also recommends a
sequence for the engineering of protection and control functions, as well as communication
engineering for IEC 61850.
The installation manual contains instructions on how to install the IED. The manual provides
procedures for mechanical and electrical installation. The chapters are organized in the
chronological order in which the IED should be installed.
The commissioning manual contains instructions on how to commission the IED. The manual
can also be used by system engineers and maintenance personnel for assistance during the
testing phase. The manual provides procedures for the checking of external circuitry and
energizing the IED, parameter setting and configuration as well as verifying settings by
secondary injection. The manual describes the process of testing an IED in a substation which
is not in service. The chapters are organized in the chronological order in which the IED should
be commissioned. The relevant procedures may be followed also during the service and
maintenance activities.
The operation manual contains instructions on how to operate the IED once it has been
commissioned. The manual provides instructions for the monitoring, controlling and setting of
the IED. The manual also describes how to identify disturbances and how to view calculated
and measured power grid data to determine the cause of a fault.
The application manual contains application descriptions and setting guidelines sorted per
function. The manual can be used to find out when and for what purpose a typical protection
function can be used. The manual can also provide assistance for calculating settings.
The technical manual contains operation principle descriptions, and lists function blocks, logic
diagrams, input and output signals, setting parameters and technical data, sorted per
function. The manual can be used as a technical reference during the engineering phase,
installation and commissioning phase, and during normal service.
The cyber security deployment guideline describes the process for handling cyber security
when communicating with the IED. Certification, Authorization with role based access control,
and product engineering for cyber security related events are described and sorted by
function.
6 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 1
Introduction
The electrical warning icon indicates the presence of a hazard which could
result in electrical shock.
The warning icon indicates the presence of a hazard which could result in
personal injury.
The information icon alerts the reader of important facts and conditions.
The tip icon indicates advice on, for example, how to design your project or
how to use a certain function.
Although warning hazards are related to personal injury, it is necessary to understand that
under certain operational conditions, operation of damaged equipment may result in
degraded process performance leading to personal injury or death. It is important that the
user fully complies with all warning and cautionary notices.
• Abbreviations and acronyms in this manual are spelled out in the glossary. The glossary
also contains definitions of important terms.
• Parameter names are shown in italics.
670 series 7
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 1 1MRK 511 399-UEN M
Introduction
For example, the function can be enabled and disabled with the Operation setting.
• Each function block symbol shows the available input/output signal.
• the character ^ in front of an input/output signal name indicates that the signal
name may be customized using the PCM600 software.
• the character * after an input signal name indicates that the signal must be
connected to another function block in the application configuration to achieve a
valid application configuration.
• Dimensions are provided both in inches and millimeters. If it is not specifically mentioned
then the dimension is in millimeters.
8 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 2
Security in Substation Automation
The electric power grid has evolved significantly over the past decade thanks to many
technological advancements and breakthroughs. As a result, the emerging “smart grid” is
quickly becoming a reality. At the heart of these intelligent advancements are specialized IT
systems, various control and automation solutions such as substation automation systems.
To provide end users with comprehensive real-time information, enable higher reliability and
greater control; the automation systems have become ever more interconnected. To combat
the increased risks associated with these interconnections, we offer a wide range of cyber
security products and solutions for automation systems and critical infrastructure.
The new generation of automation systems uses open standards such as IEC 60870-5-103,
DNP 3.0 and IEC 61850 and commercial technologies, in particular Ethernet- and TCP/IP-based
communication protocols. They also enable connectivity to external networks, such as office
intranet systems and the Internet. These changes in technology, including the adoption of
open IT standards, have brought huge benefits from an operational perspective, but they have
also introduced cyber security concerns previously known only to office or enterprise IT
systems.
To counter cyber security risks, open IT standards are equipped with cyber security
mechanisms. These mechanisms, developed in a large number of enterprise environments, are
proven technologies. They enable the design, development and continual improvement of
cyber security solutions specifically for control systems, including substation automation
applications.
ABB fully understands the importance of cyber security and its role in advancing the security of
substation automation systems. A customer investing in new ABB technologies can rely on
system solutions where reliability and security have the highest priority.
670 series 9
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 2 1MRK 511 399-UEN M
Security in Substation Automation
Security Zone 2
Workstation
MicroSCADA Pro SYS600 Encrypted
Antivirus
Antivirus communication
Firewall/
Router /
VPN
Firewall / Router / VPN
Station LAN
10 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 3
Secure system setup
To reduce exposure to cyber-attacks and thus comply with cyber security requirements, it
must be possible to prevent services in the IED from operating on other physical interfaces
than the ones specified by the vendor or by the owner.
The security guideline does not suggest concrete products for a secure system setup. This
must be decided within the specific project, requirements and existing infrastructure.
The ports used in the IED to configure firewall are listed in table 1. The column “Default state”
defines whether a port is open or closed by default. All ports that are closed can be opened as
described in the comment column in the table. Front refers to the physical front port. On the
rear side of the IED there are four network interfaces labeled 301, 302, 303 and 304. If there is
an OEM02 module installed there are two additional optical network interfaces on the rear
side, they are labeled 3061 and 3062. The protocol availability on these ports can be configured
using the Ethernet configuration tool.
ABB recommends using common security measures, like firewalls, up-to-date anti-virus
software, etc. to protect the IED and the equipment around it.
It is recommended to deactivate the Access points and protocols that are not
in use to increase cyber security.
670 series 11
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 3 1MRK 511 399-UEN M
Secure system setup
Port Protoc Default Front AP1 AP2 AP3 AP4 AP5 AP6 Service Comment
ol state of (Slot (Slot (Slot (Slot (Slot (Slot
port 301) 302) 303) 304) 3061) 3062)
49200 TCP closed OFF OFF OFF OFF OFF OFF OFF FTPS First TCP data port for
PASV
49232 TCP closed OFF OFF OFF OFF OFF OFF OFF FTPS Last TCP data port for
PASV
4711 TCP closed OFF OFF OFF OFF OFF OFF OFF IEEE 1344 Phasor measurement
4712 TCP closed OFF OFF OFF OFF OFF OFF OFF IEC/IEEE Phasor measurement
60255-118
(C37.118)
4713 TCP closed OFF OFF OFF OFF OFF OFF OFF IEC/IEEE Phasor measurement
— 60255-118
4718 (C37.118)/ IEEE
1344
Command,
header and
configuration
8910 UDP closed OFF OFF OFF OFF OFF OFF OFF IEC/IEEE Phasor measurement
— 60255-118
8915 (C37.118) /IEEE
1344 Data and
configuration
• IEC 61850
• DNP3.0
• IEC/IEEE 60255-118 (C37.118)/IEEE 1344
• SPA
• IED configuration protocol
• FTP
These communication protocols are enabled by configuration. This means that the port is
closed and unavailable if the configuration of the IED series does not contain a communication
line of the protocol. If a protocol is configured, the corresponding port is open all the time.
See the IED series technical manual and the corresponding protocol
documentation on how to configure a certain communication protocol.
• The port used for IEC 61850 (default TCP port 102) is fixed and cannot be changed.
• The ports used for DNP3 are configurable. The communication protocol DNP3 could
operate on UDP (default port 20 000) or TCP (default port 20 000). It is defined in the
configuration which type of Ethernet communication is used. Only one type is possible at
a time.
• The TCP/ UDP port used for IEC/IEEE 60255-118 (C37.118)/IEEE 1344 protocol can be
changed in the IED.
• The port used for FTP (default TCP port 21) can be changed in the IED if needed by a 3rd
party FTP client.
• The port range used for FTP PASV command is fixed and cannot be changed. The
maximum number of simultaneous ports is 16.
• The port used for SNTP when IED is configured as SNTP Client can be changed in the IED.
12 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 3
Secure system setup
Two ports are used by PCM600 to communicate with the IED. An IED configuration protocol
(TCP port 2102) and FTP. For uploading disturbance records (DR), the FTP port is used.
The port used by the IED configuration protocol is fixed and cannot be
changed.
IEC13000267-2-en.psd
IEC13000267 V2 EN-US
IEC13000268-5-en.vsd
IEC13000268 V5 EN-US
Figure 4: Optical LC or electric RJ45 Ethernet interface, position X301, X302, X303,
X304, X3061 and X3062 rear view
670 series 13
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 3 1MRK 511 399-UEN M
Secure system setup
The FTP client defaults to the best possible security mode when trying to negotiate with TLS.
The automatic negotiation mode is used by the client to negotiate with explicit TLS via AUTH
TLS.
It is only possible to access disturbance records from the IED if FTP without TLS encryption is
used.
Setting FTP to OFF on an access point does not switch off FTP as the service will still be used
by PCM600 and FST. So to completely switch off the port number 21 access the following
parameters must be set to OFF.
• FTP = OFF
• PCMAccess = OFF
• FSTAccess = OFF
No passwords are stored in clear text within the IED. A hashed representation of the
passwords with SHA 256 is stored in the IED.
IED supports TLS versions up to 1.2 (1.0, 1.1 and 1.2), decided by the client and
the setting TLSMinVersion and TLSMaxVersion set in the IED.
Configurable TLS version setting provides the possibility for the user to select the minimum
and maximum TLS versions for establishing a secure communication. This setting is applicable
only when the IED is acting as a server and not when IED acting as a client.
User can configure the TLS version only on LHMI under the /Main menu/Configuration/
Communication/Cyber security/AUTHMAN: 1. Only Security Administrator can configure
these settings.
Based on the minimum and maximum versions set by the user, and also based on the versions
supported by client, the IED decides the highest TLS version to use for communication. The
Figure 5 displays the options displayed in LHMI.
14 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 3
Secure system setup
IEC20000113-1-en.vsd
IEC20000113 V1 EN-US
1. TLSMinVersion – is used to set the minimum TLS version that should be supported for
establishing the secure communication with client.
2. TLSMaxVersion – is used to set the maximum TLS version that should be supported for
establishing the secure communication with client.
• TLS 1.0
• TLS 1.1
• TLS 1.2
By default and for the ease of configuration, TLSMinVersion is set as MinSupported and
TLSMaxVersion is set as MaxSupported.
• MinSupported – This is available only for TLSMinVersion. If user selects this setting, the
device will use currently supported minimum TLS version by the IED. The IED currently
uses TLS 1.0 for MinSupported setting.
• MaxSupported – This is available only for TLSMaxVersion. If user selects this setting, the
device will use currently supported maximum TLS version by the IED. The IED currently
uses TLS 1.2 for MaxSupported setting.
The denial of service protection is designed to protect the IED from overload when exposed to
high amount of Ethernet network traffic. The communication facilities must not be allowed to
compromise the primary functionality of the device. All inbound network traffic is quota
controlled, so that a too heavy network load can be controlled. Heavy network load might for
instance be the result of malfunctioning equipment connected to the network.
670 series 15
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 3 1MRK 511 399-UEN M
Secure system setup
The denial of service functionality in SCHLCCH and RCHLCCH measures the IED load from
communication and, if necessary, limits it from jeopardizing the IED's control and protection
functionality. The function has the following outputs:
• RCHLCCH
• LinkAUp and LinkBUp indicates the Ethernet link status for the rear ports channel A
and B
• DOSLINKA and DOSLINKB indicates that DOS functionality is active on channel A and
channel B
• DOSALARM indicates that DOS functionality is active on the access point
• SCHLCCH
• LINKUP indicates the Ethernet link status
• DOSALARM indicates that DOS functionality is active on the access point
The DOS functionality activates when the inbound traffic rate exceeds 3000
packets per second.
A self-signed certificate is generated by the IED. Certificates use encryption to provide secure
communication over the network.
The certificate is trusted (if the user selects to) during communication between the IED and
PCM600.
If Windows is configured to use UAC High the certificate have to be manually trusted.
16 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
User roles with different user rights are predefined in the IED. It is recommended to use user
defined users instead of the predefined built-in users.
The IED users can be created, deleted and edited only with PCM600. One user can belong to
one or several user roles. By default, the users in Table 2 are created in the IED, and when
creating new users, the predefined roles from Table 3 can be used.
At delivery, the IED user has full access as SuperUser until users are created
with PCM600.
670 series 17
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
After three consecutive failed login attempts the user will be locked out for ten
minutes before a new attempt to login can be performed. This time is settable
10 minutes to 60 minutes.
The PCM600 caches the login credentials after successful login for 15 minutes.
During that time no more login will be necessary.
The IED users can be created, deleted and edited only in the CAM server.
Authority This function enables/disables the maintenance menu. It also controls the
management maintenance menu log on time out.
AUTHMAN
For more information on Authority management AUTHMAN, Authority status ATHSTAT, and
Authority check ATHCHCK functions, see Chapter Basic IED functions in technical manual.
At delivery, the IED has a default user defined with full access rights. PCM600 uses this default
user to access the IED. This user is automatically removed in IED when users are defined via
the IED Users tool in PCM600.
Password: Administrator
Only characters A - Z, a - z and 0 - 9 shall be used in user names. User names are
not case sensitive. For passwords see the section Password policies.
There are different roles of users that can access or operate different areas of the IED and tool
functionalities.
Ensure that the user logged on to the IED has the required access when writing
particular data to the IED from PCM600. For more information about setting
user access rights, see the PCM600 documentation.
18 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
670 series 19
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
IED users can be created, deleted and edited only with the IED Users tool within PCM600. From
the LHMI, no users can be created nor changed.
First user created must be appointed the role SECADM to be able to write
users, created in PCM600, to the IED.
In order to allow the IED to communicate with PCM600 when users are defined
via the IED Users tool, the access rights “UserAdministration” and “FileTransfer
— Limited” must be applied to at least one user.
“DB Access normal” and “File Transfer — Limited” are required for PCM600
access to the IED.
The IED provides the possibility to change the default password of the default user
'Administrator'. Option to change the password is given only from LHMI and is not possible
through PCM600. Default user password cannot be changed if external users are configured in
the IED.
• When the IED is Reset to factory default in LHMI from the Maintenance menu, the default
password is reset to factory default.
• PCM600 will present a login dialog to the user while performing any read and write
operation.
• Field Service Tool (FST) tool will present login dialog to user while performing update/
upgrade operation on IED.
• Changed password is used for authentication for FTP login in Maintenance menu.
• Turning off authority in the Maintenance menu is only applicable to external users and not
for default user (with changed passwords).
• The default user password is reset to "Administrator" if external users are defined.
• The default user password is reset to "Administrator" if IED is upgraded using FST.
20 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
IEC20000104-1-en.vsdx
IEC20000105-1-en.vsdx
670 series 21
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
IEC20000106-1-en.vsdx
The IED Users tool in PCM600 is used for editing user profiles and role assignments.
In the IED Users tool, the data can be retrieved from an IED or data can be written to an IED if
permitted. The data from an IED can be saved to the project database.
Always use Read User Management Settings from IED before making any
changes when managing user profiles. If this is not done password changes
made by users may be lost!
22 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
In the General tab, by clicking Restore factory settings the default users can be restored in the
IED Users tool. For the IED series this means reverting back to the factory delivered users.
Performing this operation does not remove the users in the IED. Nothing is changed in the IED
until a “writing-to-IED operation” is performed.
This is not the same action as Revert to IED defaults in the recovery menu.
The previous administrator user ID and password have to be given so that the
writing toward the IED can be done.
Editing can be continued by clicking on Restore factory settings when not connected to the
IED.
IEC13000017-2-en.vsd
IEC13000017 V2 EN-US
In the User Management tab, the user profiles of the selected IED can be edited. New users
can be created, existing users can be deleted and different user group members can be edited.
670 series 23
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
IEC12000199-2-en.vsd
IEC12000199 V2 EN-US
24 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
I
EC12000200-
2-en.
psd
IEC12000200 V2 EN-US
IEC12000201-3-en.vsd
IEC12000201 V3 EN-US
670 series 25
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
IEC12000202-2-en.vsd
IEC12000202 V2 EN-US
26 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
IEC12000203-2-en.vsd
IEC12000203 V2 EN-US
670 series 27
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
IEC12000204-2-en.vsd
IEC12000204 V2 EN-US
IEC12000205-2-en.vsd
IEC12000205 V2 EN-US
28 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
IEC12000206-2-en.vsd
IEC12000206 V2 EN-US
670 series 29
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
I
EC12000207-
2-en.
psd
IEC12000207 V2 EN-US
In the Roles tab, the user roles can be modified. The user's memberships to specific roles can
be modified with a list of available user roles and users.
IEC12000208-2-en.vsd
IEC12000208 V2 EN-US
30 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
IEC12000210-2-en.vsd
IEC12000210 V2 EN-US
IED user account data can be exported from one IED and imported to another. The data is
stored in an encrypted file.
1. Click the Import Export tab in the IED User tool in PCM600.
2. Click Export IED account data.
The user account data is exported to a file with user defined filename and location.
670 series 31
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 4 1MRK 511 399-UEN M
Local user account management
Only users who have the right to change the user account data in PCM600 are allowed to
export and import.
IEC12000209-2-en.vsd
IEC12000209 V2 EN-US
• Click the Write User Management Settings to IED button on the toolbar.
• Click the Read User Management Settings from IED button on the toolbar.
Only ASCII characters are allowed when typing username or password. Currently passwords in
the range 32-126 and 192-383 (ASCII ranges, decimal) are supported.
Password policies are set in the IED Users tool in PCM600. There are several options for
forcing the password safer.
32 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 4
Local user account management
After password expiry the user is still able to login, but a warning dialog will be
displayed on the Local HMI. Also a security event will be issued.
IEC13000233-1-en.vsd
IEC13000233 V1 EN-US
I
EC13000027-
2-en.
psd
IEC13000027 V2 EN-US
Figure 20: Change Password Policies dialog box in IED Users tool in PCM600
670 series 33
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
34
1MRK 511 399-UEN M Section 5
Central Account Management
In this section, the LDAP server software description and handling is based on SDM600, which
is an ABB product. Other Central Account Management software can also be used, provided it
has sufficient functionality. This is described in Chapter 5.3.1.
SDM600 PCM600
IED
IEC150003 68-2-en-us.vsdx
IEC15000368 V2 EN-US
Figure 21: Overview of the functionality between the products in the system.
The CAM server, such as the SDM600, also acts as a CA meaning that it is able to issue digital
certificates. Each device, such as an IED, will have its own unique device certificate, one which
must be imported into the PCM600 configuration and then written to the IED. At this point
670 series 35
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
trust is automatically established directly between the CAM server and the IED. The Security
Administrator is responsible for this setup.
SDM600 can be used to create IED certificates and this chapter explains on how to create a
device certificates.
IEC15000280 V1 EN-US
36 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IED deploys only certificates bundled in a PCKS#12 file format from SDM600.
SDM600 allows user to set key length of the certificates that needs to be deployed in IED.
While it may be prudent to use a larger key size, it would also mean it requires a considerable
longer time for the TLS handshake (between IED and tools/ Central Account Management
servers) before any secure communication starts. We recommend to deploy certificates with
key length of 2048 in the IED. NSA (National Security Agency) recommendation is that RSA keys
of 2048 bit key size is acceptable.
IED will use the certificate imported via PCM600 to automatically access to the
SDM600 server. This certificate is also used as a server certificate to secure
communication of FTP and ODBC protocols.
The following are the steps to import and write certificates to the IED.
IEC15000281 V2 EN-US
670 series 37
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000346 V2 EN-US
IEC15000348 V1 EN-US
38 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000349 V1 EN-US
IEC15000350 V1 EN-US
IEC15000352.vsdx
IEC15000352 V1 EN-US
670 series 39
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000353 V1 EN-US
If the Central Account Management is active in the IED and if user deploys an invalid certificate
into an IED (e.g.: SDM600 certificate of another SDM server, than the one that is configured in
the IED), then replication will fail at the time when IED tries to replicate. The central account
management will be enabled in the IED.
If SECADM is able to login to the IED (replication) then the correct certificates can be deployed
using PCM600 otherwise, the user must go to the Maintenance menu of the IED and Disable
CAM and Delete Certificates.
IEC15000281 V2 EN-US
40 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000334 V1 EN-US
IEC15000337 V1 EN-US
IEC15000339 V1 EN-US
IEC15000340 V1 EN-US
670 series 41
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000341 V1 EN-US
The certificate can be invalid for different reasons, e.g. if the certificate has expired. In this
case, if the IED is using a self-signed certificate, it will generate a new self signed certificate.
Otherwise, when IED is using a certificate generated by SDM600, it is required that the
security administrator generates new certificates and re-deploy them using PCM600. If the
certificate has expired, PCM600 will issue a warning to the user about connecting to a device
with expired certificate. SDM600 will reject user authentication with expired certificate.
If the replication is enabled and server rejects the authentication (due to expired certificate)
then the user is allowed to login using the replicated data. IED will raise a security event 30
days before the certificate will expire and continue till the expiry date once every day.
There are two main cases when the IED accesses the server:
1. Cyclic replication
2. User authentication or to change user password
These two cases are different in that sense that one has an ongoing user interaction, while the
other occurs cyclically without user interaction. In both cases a security event will be
generated in the IED.
Deletion of certificates from IED is possible only after reading certificates from
IED.
42 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000342 V1 EN-US
IEC15000343-1-en.vsdx
A confirmation dialog appears.
IEC15000402 V1 EN-US
The certificates are deleted from the IED, confirmation of this can be seen in the tool.
IEC15000334 V1 EN-US
It will not be possible to delete Internal and External certificates from PCM600.
670 series 43
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
Central Account Management on the IED must be activated from PCM600. The following are
the steps to activate Central Account Management on the IED:
IEC15000280 V1 EN-US
5. From PCM600, select Voltage Level or Bay or IED in the plant structure.
6. Select Tools/Account Management.
7. Right click on Voltage Level or Bay or IED in the plant structure and select Account
Management. The Account Management dialog will appear as shown below:
44 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000281 V2 EN-US
IEC15000282 V2 EN-US
From Tool bar, click to import SDM600 configuration zip file that is generated
above at step #4.
10. If the SDM600 configuration zip file/certificate is protected with password (KEK), then
the user will be prompted to enter password.
670 series 45
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000283 V1 EN-US
IEC15000284 V1 EN-US
button.
46 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000286=IEC15000286=1
IE C15000286-2-en.vsdx
=en-us=Original.vsdx
IEC15000286 V2 EN-US
IE C15000287-2-en.vsdx
IEC15000287 V2 EN-US
When Central Account Management is set to active, the IED will do the following:
When this is successfully done, the IED will indicate that Central Account Management as
active. In addition, the IED will delete any users locally defined in the IED by PCM600 user tool.
670 series 47
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
If the Central Account Management activation fails, the activate parameter will be reset and
Central Account Management must be activated again and a failure message will be indicated
in PCM Output window.
When Central Account Management is activated, any ongoing sessions with the IED will
continue until they are closed.
It is possible to edit Central Account Management configuration parameters and modify them
(if needed) in PCM600. In order to edit configuration parameters, right click on the Device and
select Edit as shown below.
IEC15000288 V2 EN-US
48 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000289 V2 EN-US
Remote Configuration tab indicates the configuration that currently exists in the IED.
670 series 49
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC150002 90-1-en.vsdx
IEC15000290-2-en.vsdx
IEC15000290 V2 EN-US
Remote Configuration tab will have the configuration only if Read Central
Account Management Configuration from the IED as described in section
Reading configuration from IED is performed.
LDAP server URL must contain IP address and port number of the CAM server.
Ensure that all the parameters are written or set correctly before writing the
CAM configuration to the IED, else this can lead to lock out of the IED.
50 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
When Central Account Management is enabled in the IED, and if the user
deploys an invalid certificate in to an IED, then it is not possible to
communicate with the LDAP server. However, Central Account Management
remains enabled in the IED and the IED will be locked out. In this situation,
deactivate Central Account Management using the Disable CAM and Delete
Certificates option from the Maintenance menu.
Emergency account can be created along with the CAM configuration in PCM600 if replication
is disabled:
1. Select the Emergency Account checkbox which is provided inside CAM configuration in
AMT.
2. Enter the Username and Password and write to IED.
In case the configuration is done with import of the package, the CAM
configuration should be manually edited in PCM600 to include the
emergency account.
670 series 51
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC20000122 V1 EN-US
52 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
It is possible to read Central Account Management configuration from the IED by right clicking
on the Device and selecting Read from IED.
IEC15000291 V2 EN-US
When Central Account Management is disabled in the IED, there will not be any external users
defined in the IED. Instead the built-in, factory default users will be reactivated.
1. Right click on the Device in Account Management tool and select Edit as shown in figure
48.
670 series 53
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000292-2-en.vsdx
IEC15000292 V2 EN-US
IEC150002 93-2-en.vsdx
IEC15000293 V2 EN-US
54 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000294-1-en.vsdx
IEC15000294 V1 EN-US
In case of wrong configuration of CAM and Certificates, there is a possibility to disable Central
Account Management and delete the loaded certificates in the IED. This can be done from
recovery menu option. To enter this menu, the IED must be rebooted and a specific key
combination must be pressed on the LHMI during the IED boot sequence.
1. Switch off the power supply to the IED and leave it off for one minute.
2. Switch on the power supply to the IED and press and hold down and until the
Maintenance Menu appears on the LHMI (this takes around 20-60s).
3. Navigate down and select Recovery Menu and press or .
Maintenance Menu
1. Activate FTP server
2. Abort IED-update
3. Display IP address
4. View system event log
5. Recovery Menu (Password protected)
Press Clear to continue start-up7
Enter Maintenance
menu=IEC12000168=4=en-
IEC1200 0168-4-en. vsdx
us=Original.vsdx
IEC12000168 V5 EN-US
Figure 52:
4. Enter the PIN code and press .
IEC13000036 V6 EN-US
Figure 53:
5. Select Delete Certificates and Disable CAM and press or .
Recovery Menu
5.1 Turn off Authority (temporary)
5.2 Turn off Change-lock (temporary)
5.3 Turn off IEC61850
5.4 Revert to IED defaults
5.5 Delete Certificates and Disable CAM
5.6 Restore Points
5.7 Change PIN
Press Clear to continue start-up
IE C20000108-1-en.vsdx
IEC20000108 V2 EN-US
670 series 55
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
PLEASE CONFIRM
………………………..
OK Cancel
IEC15000364=IEC15000364=2
IEC1500 0364-2-en. vsd
=en-us=Original.vsdx
IEC15000364 V2 EN-US
The password policy is set in the Central Account Management server (SDM600). Refer to
SDM600 user manual.
In this section, the LDAP server software description and handling is based on the third party
LDAP server.
56 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
LDAP PCM600
Server
IED
IEC200005 02-1-en-us.vsdx
IEC20000502 V1 EN-US
Figure 56: Overview of the functionality between the products in the system
Before any authentication/authorization of user takes place, a trust relation must be
established. It is important for the IED to know that LDAP server to which the IED is
communicating with, is a trusted server.
In case, if there is no requirement for the server to trust the IED, then IED can communicate
with the LDAP server using its self signed certificate. To trust the LDAP server, the signer
certificate of the LDAP server i.e. Root CA / Intermediate CA certificate must be installed in the
IED using PCM600 in .p7b or .cer format.
In case of mutual trust between LDAP server and the IED, the LDAP server can act as a CA ,
which means that it can issue digital certificates. Each device, such as an IED, will have its own
unique device certificate, one which must be imported into the PCM600 configuration in .p12
or .pfx format and then written to the IED. At this point trust is automatically established
directly between the CAM server and the IED.
There are two ways of configuring the Central Account Management with LDAP server (not
using SDM600).
670 series 57
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
For each IED, create the configuration package that contains the details of the LDAP server,
certificates, and a private key.
These two files should have the same name with different file extensions, for example,
AA1J1Q01A1.xml and AA1J1Q01A1.p12.
If CAM with SDM600/AD is already enabled in the IED and user wants to switch
to CAM with LDAP server, then user must disable the CAM with SDM600/AD
before enabling the CAM with LDAP and vice versa.
The LDAP server certificate must contain the IP address as its Subject
Alternative Name.
In case, there is a need for configuring emergency account then the CAM
configuration should be edited manually after importing the configuration
package. See Section 5.3.2.3 for more details on emergency account.
<IEDName>
<IEDName> is the IEC61850 "name" attribute of the corresponding IED in SCL.
58 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
<SDM600_CAM_IED_Configuration xmlns:xsi="http://www.w3.org/2001/XMLSchema-
instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://abb.com/
ConfigurationSchema.xsd">
<IED_information>
<name>AA1J1Q01A1</name>
<address>10.1.150.3</address>
</IED_information>
<BaseDN>ou=CamUsers,dc=vmbox,dc=int</BaseDN>
<Replication_Group></Replication_Group>
<Replication_Interval>0</Replication_Interval>
<CAM_Servers>
<CAM_Server>
<ldapaddress>ldap://10.1.150.10:389</ldapaddress>
</CAM_Server>
</CAM_Servers>
</SDM600_CAM_IED_Configuration>
IED_information tag: This tag contains the IEC61850 name, description, and IP address of the
IED.
BaseDN tag: This tag contains the Base distinguished name of the LDAP server. The maximum
length of the field is 100 bytes long.
Replication_Group and Replication_Interval tags: These are ABB specific tags. Set
Replication_Interval to 0.
CAM_Servers tag: This tag contains the ldap address of the server.
It is possible to add one standby server. In this case the CAM_Servers look like:
<CAM_Servers>
<CAM_Server>
<ldapaddress>ldap://<PRIMARY_SERVER_IP>:<PRIMARY_SERVER_PORT></ldapaddress>
<ldapaddress>ldap:// <SECONDARY_SERVER_IP>:<SECONDARY_SERVER_PORT></</
ldapaddress>
</CAM_Server>
670 series 59
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
</CAM_Servers>
This provides a convenient and efficient means of transferring the configurations for multiple
devices between engineering tools.
In this case the content of the configuration package zip file should be a flat structure of pairs
of xml/p12 files for each IED.
Each p12 file in the configuration package can be protected with a password.
Although it is theoretically possible to have different (unique) passwords for each p12 file, this
is not user friendly. In this case, it is acceptable to have the same password for each p12 file.
Example:
exported_ieds.zip
+- AA1Q1D1.p12
+- AA1Q1D1.xml
+- AA1Q1D2.p12
+- AA1Q1D2.xml
Configuration of Central Account Management for LDAP server can be done manually using
Account Management Tool.
CAM configuration for LDAP server can be performed using below steps:
1. Import the certificate package and write to the IED using Import and Write Certificates
tab.
2. Configure LDAP server details, create emergency account which is optional and then
write configuration to IED. Figure 57 is the PCM600’s Account Management Tool which is
used to configure LDAP server.
60 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000281 V2 EN-US
If CAM with SDM600/AD is already enabled in the IED and user wants to
switch to CAM with LDAP server, then the user must disable the CAM with
SDM600/AD before enabling the CAM with LDAP and vice versa.
For IED to trust the LDAP server, the root CA of LDAP server is required to be installed in the
IED. Generally, LDAP server does not trust the clients, in this case the self-signed certificate
generated in the IED can be used only for encryption.
GUID-C5C6F322-9793-4BCB-8A64-0AB232F0A34D v1
User must write only the Root CA certificate/Intermediate CA certificate which is used to sign
the LDAP server certificate to the IED for authenticating the LDAP server. In this case same
certificate package can be written to all the IED’s which are connected to same LDAP server.
The Root CA/Intermediate CA certificate file format should be .p7b or .cer.
GUID-64C246AE-E771-466F-B2BE-F6506C347B25 v1
For having a mutual trust between CAM server and IED, IED certificate must be signed by the
same Root certificate which has been used to sign the LDAP server certificate. The certificate
should be exported in PKCS#12 format. This package can be imported to PCM600 using the
option Import and Write certificates in AMT and write to the IED. A certificate write can either
670 series 61
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
be a single write to one IED or a batch write to multiple IEDs. PCM needs to determine which
PKCS#12 archive to deploy to each IED in case of a batch upload.
If LDAP server is required to trust the IED then, IED certificate (CAM certificate) should be
generated out of the same signing authority.
IEC15000289 V2 EN-US
SDM600 Configuration check box must be enabled while configuring 3rd party LDAP server.
3rd party LDAP doesn't support replication, so the Replication check box will be disabled.
The LDAP server certificate can contain IP address of the host in the Subject Alternative Name
field. In this case, IED verifies the certificate IP address against the URL.
62 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
If the LDAP server certificate contains only the DNS of the host in the Subject Alternative
Name field, then the DNS of the host must be configured in the Server DNS Name field in the
configuration.
Ensure that all the parameters are written or set correctly before writing the CAM
configuration to the IED, else this can lead to lock out of the IED in case the emergency
account is not configured.
It is recommended to configure the emergency account with third party LDAP server. Once the
emergency account is configured, it will get activated only when the authentication to CAM
server fails due to the unavailability of the server. Emergency account is recommended to be
used only when there is any urgent need to perform any operation with the IED.
Emergency account can be created along with the CAM configuration in PCM600:
1. Select the Emergency Account checkbox which is provided inside CAM configuration in
AMT.
2. Enter the Username and Password and write to IED.
In case the configuration is done with import of the package, the CAM
configuration should be manually edited in PCM600 to include the
emergency account
670 series 63
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC20000122 V1 EN-US
64 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
Active Directory (AD) is a Microsoft product that consists of several services that run on
Windows Server to manage permissions and access to network resources.
The main service in Active Directory is Domain Services (AD DS), which stores directory
information and handles the interaction of the user with the domain. AD DS verifies access
when a user signs into a device or attempts to connect to a server over a network using LDAP.
AD DS controls which users have access to each resource. For example, an administrator
typically has a different level of access to data than an end user.
AD Server PCM600
IED
IEC200001 15-1-en-us.vsdx
IEC20000115 V1 EN-US
Figure 60: Overview of the functionality between the products in the system
IED to use AD server as authentication server which works on group-based authorization
where every user is mapped with the groups in the server. When IED authenticates the user
from the server then the server acknowledges with the user info and groups of that user to the
IED.
IED uses roles defined in IEC 62351-8 for providing the authorization to the users. Since AD
server works on group-based authorization, PCM600 provides the infrastructure to map AD
groups to IEC 62351-8 roles defined in IED. Groups to roles mapping must be written to the IED
before enabling the CAM configuration with AD. During authentication, AD server authorizes
the user and sends the groups associated with that user to the IED. IED then maps the groups
to roles based on the groups to roles mapping configured in the IED.
670 series 65
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
Before any authentication/ authorization of user takes place, a trust relation must be
established. It is important for the IED to know that AD server to which the IED is
communicating with, is a trusted server.
In case, if there is no requirement for the server to trust the IED, then IED can communicate
with the AD server using its self-signed certificate. To trust the AD server, the signer certificate
of the AD server i.e. Root CA / Intermediate CA certificate must be installed in the IED using
PCM600 in .p7b or .cer format.
In case of mutual trust between AD server and the IED, the AD server can act as a CA, which
means that it can issue digital certificates. Each device, such as an IED, will have its own
unique device certificate, one which must be imported into the PCM600 configuration in .p12
or .pfx format and then written to the IED. At this point trust is automatically established
directly between the CAM server and the IED.
Configuration of Central Account Management with AD server can only be done manually in
PCM600. As a prerequisite it is essential to have certificate package and group file exported
from the AD server.
CAM configuration for AD server can be performed using these steps:
1. Import the group file in PCM600 and map group to roles and write to IED using the Roles
to Active Directory Group Mapping tab.
2. Import the certificate package and write to the IED using the Import and Write
Certificates tab.
3. Configure LDAP server details, create emergency account which is optional and then
write configuration to IED using the Centralized Account Management Configuration
tab.
Figure 61 is the PCM600’s Account Management Tool which is used to configure LDAP
server.
66 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC15000281 V2 EN-US
• Roles to Active Directory Group mapping: Used to import groups and then map groups to
roles and write to IED.
• Import and write Certificate: Used to write device certificate to the IED.
• CAM Configuration: Used to configure LDAP server details and emergency account.
• Rights to Role Mapping: IED by default has rights to roles mapping, user can use this
option to customize rights to roles.
• Reset Emergency Account: Used to reset emergency account and write to IED.
If CAM with SDM600/LDAP is already enabled in the IED and the user wants to
switch to CAM with AD, then the user must disable the CAM with SDM600/
LDAP before enabling the CAM with AD and vice versa.
Using "Roles to Active Directory Group Mapping” tool in AMT, the group file exported from AD
server can be imported in PCM600. The supported formats for group file in PCM600
are .txt, .ldif and .csv.
1. Select Roles to Active Directory Group Mapping tool to select the IED’s to import the
group file. The IED’s which has AD support is only enabled.
670 series 67
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC20000116 V1 EN-US
IEC20000119 V1 EN-US
68 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC20000120 V1 EN-US
Figure 64: Message box displaying to confirm roles configuration in all selected
IED’s
For TLS handshake between IED and AD server, X.509 certificates are used.
For IED to trust the AD server, the root CA of AD server is required to be installed in the IED.
Generally, AD server does not trust the clients, in this case the self-signed certificate
generated in the IED can be used only for encryption. User must write only the Root CA
certificate/Intermediate CA certificate which is used to sign the AD server certificate to the
IED for authenticating the AD server. In this case same certificate package can be written to all
the IED’s which are connected to same AD server. The Root CA/Intermediate CA certificate file
format should be in .p7b or .cer format.
In case, if AD server is required to trust the IED then the IED certificate (CAM certificate) should
be generated out of the same signing authority.
For having a mutual trust between CAM server and IED, IED certificate must be signed by the
same Root certificate which has been used to sign the AD server certificate. The certificate
should be exported in PKCS#12 format. This package can be imported to PCM600 using the
670 series 69
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
option Import and Write certificates in AMT and write to the IED. A certificate write can either
be a single write to one IED or a batch write to multiple IEDs. PCM needs to determine which
PKCS#12 archive to deploy to each IED in case of a batch upload.
It is possible to import certificate in bulk to PCM600. For that the certificate bundle format
should be as mentioned below:
1. IED certificate name should be a Technical Key and file format can be pkcs12, .pfx, .p7b
or .cer (e.g. AA1J1Q01A1.p12 or AA1J1Q01A1.p7b). User can get the technical key of the IED
which is configured in PCM600.
2. Certificate bundle should be a zip file which contains single /multiple IEDs certificates as
mentioned below.
IEC20000126 V1 EN-US
IEC15000346 V2 EN-US
70 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
Centralized Account Management Configuration tab is used to fill the details of the AD server
and write to the IED.
IEC15000289 V2 EN-US
The AD server certificate can contain IP address of the host in the Subject Alternative Name
field. In this case, IED verifies the certificate IP address against the URL.
If the AD server certificate contains only the DNS of the host in the Subject Alternative Name
field, the DNS of the host must be configured in the Server DNS Name field in the
configuration.
670 series 71
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
Ensure that all the parameters are written or set correctly before writing the CAM
configuration to the IED, else this can lead to lock out of the IED in case the emergency
account is not configured.
Once the configuration is done, then save the configuration and write to the IED to enable the
CAM in IED.
• There is a limitation from the IED that the full name or display name should be provided as
the user name while logging in to the AD server from IED.
• User name and password should contain only ASCII (American Standard Code for
Information Interchange) characters.
• The display name should be of maximum 31 characters and password should be of
maximum 24 characters.
Users in AD server can be created using the following below password permissions as shown
in the Figure 68.
72 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
GUID-9DC6026C-8906-4A43-A3FB-4882C74237B4 V1 EN-US
1. User must change the password at next login: Creating users in AD server using this
password permission is not recommended as the IED does not support to change the
password only during the first login. When any user with this permission set tries to login
for the first time without changing the password then error message is displayed,
(Password must be changed) on the LHMI and PCM600, and the login will be denied. In
this case user may change the password using windows machine connected to the AD
server.
2. Password never expires: When any user with Password never expires permission logins
successfully through LHMI or PCM600, then the warning message (Password for this user
account never expires) is always displayed on LHMI or PCM600 and user will be allowed to
login.
If password of any AD user is going to expire within 10 days, then password expiry warning is
displayed on LHMI or PCM600. Once the user attempts to login through LHMI / PCM600 then
login will be successful.
Once the password is expired then the user will not be allowed to login through the IED.
If the UTC time in the IED is different to that of AD server then the password
expiry may not work as expected.
Password can be changed from both the LHMI and PCM600. IED abides with the password
policy set in the AD Server.
670 series 73
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
• Uppercase—for example, A to Z
• Lowercase—for example, a to z
• Numeric—0 to 9
• Nonalphanumeric—symbols such as, !, #, %, or &.
• Maximum password length allowed in IED is 24 characters.
• Client certificate
• The private key associated with the client certificate
• A Trust anchor certificate
The PKCS12 file can be protected with a password, as it contains the private key associated
with the client certificate.
The password for the p12 file should be protected. Normal password protection procedures
and guidelines will apply, for example, use a secure password, do not store the password in
clear text and do not share/publish the password, etc.
Client Certificate
The communication between the device and the LDAP/AD server will be protected using TLS
mutual authentication.
The certificate contained in the configuration will be used by the device to self authenticate
towards the LDAP/AD. In this case the certificate is used as a client certificate. This is the
client authentication part of the TLS mutual authentication.
This certificate can also be used by services on the IED, that is, it can also act as
a server certificate on the IED.
The client certificate must contain the IP address of the client as its Subject
Alternative Name and the IP address must be at the top in SAN details as
shown in Figure 69 and Figure 70.
74 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
IEC20000503 V1 EN-US
IEC20000537 V1 EN-US
670 series 75
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC20000504 V1 EN-US
The trust anchor certificate identifies the organization which the device will trust.
The trust anchor certificate will typically be the Root Certificate of the Certificate Authority
that issues all certificates for devices and applications in the system. In other words, this
device will trust any TLS peer that presents a certificate that has a "chain of trust" back to the
trust anchor certificate.
The trust anchor certificate identifies the organization which the device will trust.
The trust anchor certificate will typically be the Root Certificate or the Intermedia CA of the
Certificate Authority that has issued the certificate for the CAM server.
To redeploy the certificate, Import and Write Certificates option in PCM600 can be used.
When the IED certificate is about to expire, UAL events prior to 30 days of expiry will be
76 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
generated. User must redeploy the certificate before it is expired. In case, the certificate is
already expired user may not be able to communicate with the CAM server.
1. Boot the IED after turning off authority in recovery menu and redeploy the certificates.
2. Disable CAM and delete certificate under recover menu, in this case CAM server must be
configured freshly, including certificates.
1. Restore point creation will copy CAM configuration, emergency account, IED certificates,
groups to roles mapping(in case of AD server) and rights to roles mapping.
2. Upon revert to restore point, the CAM configuration, emergency account, IED certificates,
groups to roles mapping(in the case of AD server) and rights to roles mapping present in
restore point will be applied.
There are different roles of users that can access or operate different areas of the IED and tool
functions.
670 series 77
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
ADMINISTR
Access rights VIEWER OPERATOR ENGINEER INSTALLER SECADM SECAUD RBACMNT
ATOR
DB Access normal - X X X X X X X
Audit log read - - - - - X - X
Setting – Change - X X X - - -
-
Setting Group
Security Advanced - - - - - X - X
ADMINISTRATOR is a vendor specific user role and not specified in IEC 62351-8
IED users can be created, deleted and edited only in the CAM server. From the LHMI or
PCM600, no users can be created nor changed when Central Account Management has been
enabled in the IED. However, user rights are edited using the PCM600 user tool (IEDUM) and
password can be changed from PCM600 or LHMI.
At delivery, the IED has a default Administrator defined with full access rights. PCM600 uses
this default user to access the IED. This user is automatically removed in IED when CAM is
enabled.
78 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
Only characters A - Z, a - z and 0 - 9 shall be used in user names. User names are
not case sensitive. For passwords see the Password policies.
In order to allow the IED to communicate with PCM600 when users are defined
in the CAM server, the access rights “UserAdministration” and “FileTransfer —
Limited” must be applied to at least one user. User rights are assigned using
the PCM600 user tool (IEDUM).
"DB Access normal" and "FileTransfer – Limited" are required for PCM600
access to the IED.
To know the status of the Central Account Management, the diagnostics information is
provided on Local HMI. This is available under Diagnostics/Communication/CAM status/
CAMStatus
1. When IED is not configured with any users, the default status of the CAMStatus
diagnostics will be:
IEC15000369-2-en.vsdx
IEC15000369 V2 EN-US
670 series 79
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000354-2-en.vsdx
IEC15000354 V2 EN-US
IEC150003 55-2-en.vsdx
IEC15000355 V2 EN-US
When the CAM server is configured with SDM600 server along with
replication, only then the replication status is shown.
80 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
670 series 81
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
If the initial activation of CAM fails, the IED reverts to local UAM or default
users. Access to the device is possible using the local default credentials. If
syslog is not configured then security events can be read from Event
Viewer tool in PCM600.
Authentication will continue to work based on the latest local LDAP Replica
if replication is enabled. After reconnection with the server(s),
authentication will again run via the LDAP server and the local replica will
be updated.
IEC15000356-2-en.vsdx
IEC15000356 V2 EN-US
82 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
Authentication will continue to work based on the latest local LDAP replica.
After reconnection with the server(s), authentication will again run via the
LDAP server and the local replica will be updated.
Information about the currently installed certificates can be found in the local HMI by
traversing the menu tree by using the arrow keys. Main menu/Diagnostics/Communication
IEC15000324 V1 EN-US
Only the categories with installed certificates are shown. If no external, trusted or CAM
certificates are installed then a category named internal is shown which lists the certificates
generated by the device.
In figure 76, two certificates are shown for the selected usage.
670 series 83
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
IEC15000326 V1 EN-US
IEC15000327 V1 EN-US
IEC15000328 V1 EN-US
84 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
The user rights can be edited in the IED by using the PCM600 user tool.
One user can have one or several user roles. By default, the users in Table 13 are created in the
IED, and when creating new users in the CAM server, the predefined roles from Table 14 can be
used.
At delivery, the IED user has full access as SuperUser when using the LHMI and
as Administrator when using FTP or PCM600 until Central Account
Management is activated.
The successful activation of Central Account Management will disable built-in users or remove
all local created users from PCM600.
670 series 85
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
Management of user credentials and roles is handled on the Central Account Management
server e.g. SDM600. The IED employs two strategies to ensure availability of the
authentication system even if there is a problem with the network or authentication server:
Note that not all users in the SDM600 server are part of the replica. There might be users that
are not assigned to any replication group. IED only replicates those users which are part of
replication group configured in the IED.
All communication between the central management and the IEDs is protected using secure
communication. Customers are required to generate and distribute certificates during the
engineering process of the substation. These certificates ensure mutual trust between IED and
CAM server for example SDM600.
The IED users can be created, deleted and edited only in the CAM server.
Authority This function enables/disables the maintenance menu. It also controls the
management maintenance menu logon time out.
AUTHMAN
For more information on the functions Authority Management (AUTHMAN), Authority Status
(ATHSTAT), and Authority Check (ATHCHCK) functions, refer to chapter “Basic IED functions”
in the Technical Manual.
During normal access, e.g. parameter writing to the IED from PCM600, the user interaction will
be very similar as to a non Central Account Management enabled IED. The following steps are
included in the process:
86 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
When the user tries to communicate with an IED using PCM600, then PCM600
will validate the “Certificate” presented by the IED and if there are new
warnings/errors found during certificate validation, PCM600 will display a
Security Warning to the user. In this situation, user needs to take appropriate
action on the security warning to continue communicating with the IED.
The user can also change the own password from PCM600 or LHMI. The following process is
used:
As soon as the IED get feedback from the Central Account Management server that the
password is about to expire or that the password need to be changed, the user will be forced
to change the password in case of SDM600.
The CAM Server will issue a warning message that the password is going to expire (for
instance in 5 days) if this feature is configured in CAM Server. If the password has expired or is
not valid for other reasons, a new password must be set in the Central Account Management
server.
A change of password for any user, via PCM600 or LHMI, will force a replication of the users to
the IED. Otherwise, if the communication to the Central Account Management server is lost
shortly after the passwords is changed, the old password must be used until the connection to
Central Account Management server is restored. All other IEDs in the system need to wait until
next cyclic replication.
Changing password
670 series 87
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
1. Right click on the IED in plant structure and select IED users tool.
2. Go to General Tab.
3. Click on Change Own Password, then following dialog will appear
IEC15000295-1-en.vsdx
IEC15000295 V1 EN-US
When a user wants to access the IED or change the password, it might fail. In such cases the
user will be presented that it failed and also a reason.
The tables below list the possible error messages. The UAL column marks if the error is logged
as a security event. The User feedback column marks the message to the user. In some cases
another error is listed and will be presented for the user.
88 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 5
Central Account Management
670 series 89
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 5 1MRK 511 399-UEN M
Central Account Management
90 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 6
User activity logging
Activity Logging can be reported from the IED through two different protocols; either IEC
61850 or Syslog. Syslog is a standard for computer message logging (RFC 5424). For IEC
61850, configuration is as for buffered reporting. Syslog is configured through a number of
parameters where the Syslog server is defined. The IED is the Syslog client and it sends the
events to the Syslog server.
Both IEC 61850 and Syslog are to be seen as online protocols when it comes to activity
logging. If an event has occurred while 61850 or Syslog communication has been down, the
events will not be retransmitted. In this case, use PCM600 to read out the activity logging from
the IED.
There can be 6 external log servers to send syslog events to. Each server can be configured
with IP address; IP port number and protocol format. The format can be either syslog (RFC
5424) or Common Event Format (CEF) from ArcSight.
6.3 Settings
PID-6908-SETTINGS v2
670 series 91
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 6 1MRK 511 399-UEN M
User activity logging
As a logical node GSAL is used for monitoring security violation regarding authorization,
access control and inactive association including authorization failure. Therefore, all the
information in GSAL can be configured to report to 61850 client. For more information about
GSAL, see IEC 61850 Edition 2 Communication Protocol Manual.
The function creates and distributes security events for mapping the security events on
protocols such as DNP3.
It is possible to map respective protocol to the signals of interest and configure them for
monitoring with the Communication Management tool (CMT) in PCM600. No events are
mapped by default.
Parameter names:
SECALARM
EVENTID
SEQNUMBER
IEC13000006-1-en.vsd
IEC13000006 V1 EN-US
92 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 6
User activity logging
6.5.1 Signals
PID-3430-OUTPUTSIGNALS v6
6.5.2 Settings
PID-3430-SETTINGS v6
Relevant user operations are logged as security events. A security event contains an event ID, a
time stamp, a sequence number, the user name, the severity of the action and the name of the
source. These events can be sent to external security log servers using Syslog. The log servers
are configured from PCM600. Syslog is a standard protocol for event logging.
To be able to access the security logs the user need the role SECAUD (security
auditor) or the access right “Audit log read”.
The following table contains the event types that can be logged, including their 61850
mapping on the logical node GSAL
670 series 93
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 6 1MRK 511 399-UEN M
User activity logging
94 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 6
User activity logging
670 series 95
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 6 1MRK 511 399-UEN M
User activity logging
96 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 7
Local HMI use
At delivery, login is not required and the user has full access until users and passwords are
created with PCM600 and written into the IED. The LHMI is logged on as SuperUser by default
until other users are defined.
Commands, changing parameter values and resetting indications, for example, are actions
requiring password when the password protection is activated. Reading information on the
LHMI is always allowed without password. The LHMI is logged on as Guest by default when
other users are defined.
The auxiliary power supply to the IED must not be switched off before changes
such as passwords, setting parameter or local/remote control state changes
are saved.
IEC12000161-3-en.vsd
IEC12000161 V3 EN-US
670 series 97
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 7 1MRK 511 399-UEN M
Local HMI use
Each added character is shown for a short time, then hidden with an asterisk character ‘*’
to enhance security. You can end password editing at any time by pressing while the
password field is focused (or navigate to the OK button and press ) to attempt to
login, or press (or navigate to the Cancel button and press ) to abort the login
attempt.
When the cursor is moved, the newly selected character is shown for a short time.
IEC150000 61-2-en.vsdx
IEC15000061 V2 EN-US
IEC12000157-3-en.vsd
IEC12000157 V3 EN-US
7. Select OK on the on-screen keyboard and press to stop editing the password.
8. Select OK in the Log on dialog and press to confirm the login, or press or Cancel
to cancel the procedure.
If the login fails, a message is displayed on the display.
IEC12000158.vsdx
IEC12000158 V4 EN-US
IEC13000283-1-en.vsdx
IEC13000283 V1 EN-US
98 670 series
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
1MRK 511 399-UEN M Section 7
Local HMI use
Once a user is created and written into the IED, login is possible with the
password assigned in the tool. If there is no user created, an attempt to
login causes the display to show a corresponding message.
IEC12000160-2-en.vsd
IEC12000160 V2 EN-US
The user is automatically logged off after the display timeout. The IED returns to a state where
only reading is enabled. Manual logoff is also possible.
1. Press .
2. To confirm logoff, select Yes and press .
IEC12000159-3-en.vsd
IEC12000159 V3 EN-US
Editable values are stored in the nonvolatile flash memory. Most of the parameter changes
take effect immediately after storing, but some parameter changes require application
restart. Values stored in the flash memory remain in effect also after reboot.
670 series 99
Cyber security deployment guideline
© Copyright 2017 ABB Power Grids. All rights reserved
Section 7 1MRK 511 399-UEN M
Local HMI use
Pressing Cancel in the Save changes dialog closes only the Save changes dialog
box, but the IED remains in the editing mode. All the changes applied to any
setting are not lost, and changing settings can continue. To leave the change
setting mode, select No or Yes in the Save changes dialog.
After changing the parameters marked with the exclamation mark “!”, the IED
restarts automatically for the changes to take effect.
Function keys are used as a short keys to traverse the Menu or it can be mapped as an input to
any function/component to control or block the component from the LHMI.
IEC18001001-1-en.vsd
IEC18001001 V1 EN-US
When users are configured through local or central account management, the default behavior
of the function keys are to only operate if a user is logged in, and the user have the required
rights. This authentication check can be configured to be bypassed per function key by
changing the ReqAuthority from ON to OFF. To be able to change this, the user changing it
have to have the Security advanced right.
It is possible to disable the Maintenance menu. This is done by setting the parameter
MaintMenuEnable to No in the Group AUTHMAN: 1 using the Parameter settings in PCM600.
To enter this menu, the IED must be rebooted and a specific key combination must be pressed
on the LHMI during the IED boot sequence.
1. Switch off the power supply to the IED and leave it off for one minute.
2.
Switch on the power supply to the IED and press and hold down and until the
Maintenance Menu appears on the LHMI (this takes around 20-60s).
Maintenance Menu
1. Activate FTP server
2. Abort IED-update
3. Display IP address
4. View system event log
5. Recovery Menu (Password protected)
Press Clear to continue start-up7
Enter Maintenance
menu=IEC12000168=4=en-
IEC1200 0168-4-en. vsdx
us=Original.vsdx
IEC12000168 V5 EN-US
This section will help the users to change Maintenance Menu default pin value.
1. In Maintenance Menu, navigate down and select Recovery Menu and press or .
Maintenance Menu
1. Activate FTP server
2. Abort IED-update
3. Display IP address
4. View system event log
5. Recovery Menu (Password protected)
Press Clear to continue start-up7
Enter Maintenance
menu=IEC12000168=4=en-
IEC1200 0168-4-en. vsdx
us=Original.vsdx
IEC12000168 V5 EN-US
IEC13000036 V6 EN-US
In the newly produced IED, the default PIN is (8282). Default PIN 8282 is
valid only if PIN is never changed, if the PIN is changed use new PIN to
enter Recovery Menu.
3. On the Recovery Menu, select the Change PIN option to change the PIN.
Recovery Menu
5.1 Turn off Authority (temporary)
5.2 Turn off Change-lock (temporary)
5.3 Turn off IEC61850
5.4 Revert to IED defaults
5.5 Delete Certificates and Disable CAM
5.6 Restore Points
5.7 Change PIN
Press Clear to continue start-up
IE C20000108-1-en.vsdx
IEC20000108 V2 EN-US
Change PIN
OK Cancel
IEC20000109-1-en.vsdx
IEC20000109 V2 EN-US
The allowed characters are only numeric (0-9) with scrolling option.
IEC20000110-1-en.vsdx
IEC20000110 V1 EN-US
UAL event
There are few UAL scenarios related to Maintenance menu default PIN change:
This section is only valid for PCM600 users. For Central Account Management
users, the administrator should reset the password in the Central Account
Management server (SDM600/LDAP server/AD server).
In case of password loss or any other file system error that prevents the IED from working
properly, the whole file system can be restored to IED default state. All the default settings and
configuration files stored in the IED at the factory are restored. One important usage of this
menu is to disable the authority system. This can be used to recover an IED where the user-
defined passwords are lost
To enter this menu, the IED must be rebooted and a specific key combination must be pressed
on the LHMI during the IED boot sequence.
1. In Maintenance menu, navigate down and select Recovery Menu and press or .
Maintenance Menu
1. Activate FTP server
2. Abort IED-update
3. Display IP address
4. View system event log
5. Recovery Menu (Password protected)
Press Clear to continue start-up7
Enter Maintenance
menu=IEC12000168=4=en-
IEC1200 0168-4-en. vsdx
us=Original.vsdx
IEC12000168 V5 EN-US
IEC13000036 V6 EN-US
Recovery Menu
5.1 Turn off Authority (temporary)
5.2 Turn off Change-lock (temporary)
5.3 Turn off IEC61850
5.4 Revert to IED defaults
5.5 Delete Certificates and Disable CAM
5.6 Restore Points
5.7 Change PIN
Press Clear to continue start-up
IE C20000108-1-en.vsdx
IEC20000108 V2 EN-US
IEC12000169-4-en.vsdx
IEC12000169 V4 EN-US
The IED perform a reboot, new settings are activated and the authority system is enabled
again.
The Maintenance Menu is only available on the Local HMI. The purpose of this
menu is to have a way to recover in the field at different situations. The
recovery menu is also protected with a 4–digit PIN code, fixed for all IEDs.
Revert to IED defaults will not remove the security events in the IED.
There exist a fallback solution, to access the IED via Maintenance menu. Since the Maintenance
menu requires direct access to the IED and a restart of the device, this will be reported in the
system.
• Temporarily disable authentication until next reboot of the device. This is also applicable
for local account management IEDs.
• Delete Certificates, Disable CAM? : This will delete all certificates in the IED and disables
Central Account Management. It is persistent and Central Account Management
deployment has to be done again in the IED.
For customers that do not allow any fallback, this fallback functionality can be disabled by
setting parameter MaintMenuDisAuth in: Main Menu/Configuration/Communication/Cyber
security/AuthMan:1
When the IED is reverted to IED defaults through Maintenance menu, the
certificates will be deleted.
A total of three restore points can be active, one of these is reserved to the “IED update
functionality” and two can be created by the user in the “Maintenance menu”.
1. In Maintenance menu, navigate down and select Recovery Menu and press or .
Maintenance Menu
1. Activate FTP server
2. Abort IED-update
3. Display IP address
4. View system event log
5. Recovery Menu (Password protected)
Press Clear to continue start-up7
Enter Maintenance
menu=IEC12000168=4=en-
IEC1200 0168-4-en. vsdx
us=Original.vsdx
IEC12000168 V5 EN-US
IEC13000036 V6 EN-US
IEC12000170-4-en.vsdx
IEC12000170 V4 EN-US
IEC17000034-1-en.vsdx
IEC17000034 V1 EN-US
IEC17000035-1-en.vsdx
IEC17000035 V1 EN-US
IEC17000036-1-en.vsdx
IEC17000036 V1 EN-US
IEC17000037-1-en.vsdx
IEC17000037 V1 EN-US
IEC17000038-1-en.vsdx
IEC17000038 V1 EN-US
IEC17000039-1-en.vsdx
IEC17000039 V1 EN-US
Cyber security issues have been the subject of standardization initiatives by ISA, IEEE, or IEC
for some time and ABB plays an active role in all these organizations, helping to define and
implement cyber security standards for power and industrial control systems.
Some of the cyber security standards which are most important for substation automation are
still under active development such as IEC 62351 and IEC 62443 (former ISA S99). ABB is
participating in the development by delegating subject matter experts to the committee
working on the respective standard. Since these standards are still under development ABB
strongly recommends to use existing common security measures as available on the market,
for example, VPN for secure Ethernet Communication.
An overview of applicable security standards and their status is shown in Table 23:
ABB has identified cyber security as a key requirement and has developed a large number of
product features to support international cyber security standards such as NERC-CIP,
IEEE1686, as well as local activities like the German BDEW white paper.
The two standards IEC 62351 and IEC 62443 are still under revision. Due to interoperability
reasons ABB recommend not to implement these standards yet. Nevertheless, ABB considers
these standards already today as a guideline to implement product features or system
architectures.
Relion 670 IED supports compliance to FIPS algorithms enforced in the PCM600.
This chapter contains a compliance statement of the 670 series security functionality against
the standard IEC 62443-4-2 Security for industrial automation and control systems – Part 4-2:
Technical security requirements for IACS components.
670 series devices are considered as embedded devices, so "Embedded device requirements"
have been selected.
Section 9 Glossary
GUID-2282AE1E-7E51-4F9F-8066-70614FB38695 v5
FTPS FTPS (also known as FTP-ES, FTP-SSL and FTP Secure) is an extension to
the commonly used File Transfer Protocol (FTP) that adds support for the
Transport Layer Security (TLS) and the Secure Sockets Layer (SSL)
cryptographic protocols.
GDE Graphical display editor within PCM600
GOOSE Generic object-oriented substation event
GPS Global positioning system
GSM GPS time synchronization module
GTM GPS Time Module
HMI Human-machine interface
ID IDentification
IEC International Electrical Committee
IEC 60255 This standard specifies the general performance requirements of all
electrical measuring relays and protection equipment used in the
electrotechnical fields covered by the IEC.
IEC 60870-5-103 Communication standard for protective equipment. A serial master/slave
protocol for point-to-point communication
IEC 61850 Substation automation communication standard
IEC 61850–8–1 Communication protocol standard
IED Intelligent electronic device
IEDUM IED User Management
IEEE Institute of Electrical and Electronics Engineers
IEEE 1344 A standard that defines parameters for synchrophasors for power
systems. The standard also added extension to the IRIG-B time code to
cover year, time quality, daylight saving time, local time offset and leap
second information. IEEE 1344 was published in 1994 and was
superseded by IEEE C37.118 in 2005 and the time extensions were
adopted as part of the IRIG timing standard in the 2004 edition.
IEEE 1686 Standard for Substation Intelligent Electronic Devices (IEDs') Cyber
Security Capabilities
IEEE C37.118-2005 IEEE standard for synchrophasors for power systems. The standard was
published in 2006 and a new version of the standard was published in
December 2011 which split the IEEE C37.118-2005 into IEEE C37.118.1-2011
and IEEE C37.118.2-2011.
IEEE IEEE standard for synchrophasor measurements for power systems. IEEE
C37.118.1-2011 C37.118.1-2011 is superseded by IEEE C37.118.1a-2014.
IEEE IEEE standard for synchrophasor data transfer for power systems.
C37.118.2-2011
IP 1. Internet protocol. The network layer for the TCP/IP protocol suite
widely used on Ethernet networks. IP is a connectionless, best-effort
packet-switching protocol. It provides packet routing, fragmentation and
reassembly through the data link layer.
2. Ingression protection, according to IEC standard
IP 20 Ingression protection, according to IEC standard, level 20
ISO 9001 Set of standards for quality management.
IT Information technology
KEK key encryption key. Key used to protect other keys (e.g. TEK, TSK).
UDP The User Datagram Protocol (UDP) is one of the core members of the
Internet protocol suite. With UDP, computer applications can send
messages, in this case referred to as datagrams, to other hosts on an
Internet Protocol (IP) network without prior communications to set up
special transmission channels or data paths.
UMT User management tool
UTC Coordinated Universal Time. A coordinated time scale, maintained by the
Bureau International des Poids et Mesures (BIPM), which forms the basis
of a coordinated dissemination of standard frequencies and time signals.
UTC is derived from International Atomic Time (TAI) by the addition of a
whole number of "leap seconds" to synchronize it with Universal Time 1
(UT1), thus allowing for the eccentricity of the Earth's orbit, the rotational
axis tilt (23.5 degrees), but still showing the Earth's irregular rotation, on
which UT1 is based. The Coordinated Universal Time is expressed using a
24-hour clock, and uses the Gregorian calendar. It is used for aeroplane
and ship navigation, where it is also sometimes known by the military
name, "Zulu time." "Zulu" in the phonetic alphabet stands for "Z", which
stands for longitude zero.
VPN A Virtual Private Network (VPN) extends a private network across public
networks like the Internet. It enables a host computer to send and receive
data across shared or public networks as if it were a private network with
all the functionality, security and management policies of the private
network.
www.abb.com/protection-control
1MRK 511 399-UEN