-

IEC 62443 Compliance

The IEC 62443 standard defines functional requirements regarding the security of Industrial Control and Automation Systems (IACS) regarding:

From these functional requirements, application-specific system requirements can be derived and implemented accordingly.

Furthermore, the IEC 62443 standard defines three different roles. Depending on your role, different security-related requirements arise in order to become certified according to the IEC 62443 standard.

Consider the following security-related measures to protect PLCnext Engineer, the data and solutions created with it as well as your PLCnext Technology application.

Security StageDescription
Protection of the PC on which PLCnext Engineer runsImplementation of a suitable user authentication on the Windows PC must ensure that the user is known and authorized to use PLCnext Engineer.
  • Users must log-on to Windows (standard login mechanism).
  • Separate account per user (no "group login").
  • Corporate policies regarding user administration, password rules, etc., must be defined.
  • Logged-on Windows user is allowed to start and use PLCnext Engineer.
  • Standard Windows login should be supplemented by multifactor authentication tool: verification of the user identity, e.g. via a mobile app (push notification, biometric recognition, etc.), via a PIN or finger print, hardware/software token, etc.
  • A suitable and up-to-date virus/malware detection software should be used, and a firewall is activated and configured.
For more information on PC-based hardening and organization measures, refer to section "Recommended general measures for PC-based software".
Integrity check of the downloaded PLCnext Engineer setup fileAfter downloading the setup and prior to the installation, you should verify that the downloaded PLCnext Engineer setup file has not been corrupted/tampered.

For that purpose, compare the SHA256 checksum which is noted for each software in the Phoenix Contact Download Center with the checksum of the downloaded file.

Example

After downloading the setup file, use a suitable tool to calculate a SHA256 checksum over the downloaded file. If the calculated SHA256 checksum is identical with the checksum listed in the Phoenix Contact Download Center, the setup file can be executed.

Example
Integrity check of the PLCnext Engineer installationPrimarily, use a standard Windows tool to verify that the PLCnext Engineer installation is not tampered/corrupted.

Alternatively, the ChecksumCalculator tool is provided by Phoenix Contact:

When installing PLCnext Engineer, checksums are calculated over the installation. By verifying these checksums, manipulations and data corruption can be detected.

For that purpose, the ChecksumCalculator can be executed regularly to monitor the integrity of the PLCnext Engineer installation. See topic "Security Guideline for PLCnext Engineer" for further information.
Protection of project dataPLCnext Engineer implements features for project data protection:
  • Tamper protected libraries
  • Know-how protected libraries
  • Protection of safety data integrity/consistency
  • Protection of integrity and authorship of safety-related, loadable C functions
See section "Security features implemented in PLCnext Engineer" for details.

Besides the correct usage of these features, you must additionally protect your project data on the hard disk and during transfer. The reason for this is that PLCnext Engineer currently stores plain, i.e., unencrypted project data on the harddisk of your computer. This also applies to project archives and exported libraries. The data is therefore unprotected against tampering and theft.

Therefore, you must use suitable encryption tools to protect data on your harddisk and while transferring them.

Refer to section "Protection of project data on the hard disk and during transfer" for details.
Protection of data transmission between PLCnext Engineer and PLCnext Technology controllerPLCnext Engineer implements features for securing the data connections between the engineering software and the controller firmware: only authorized users can communicate with the controller via a secured connection.

  • Data transmission is protected by means of TLS. Transport Layer Security is a encryption protocol which secures the Internet data transfer.
  • During a logon to the controller, the identity of both the PLCnext Engineer instance and the PLCnext Technology controller ID are verified and must match. This is done by means of certificates.

    To ensure that your automation system can only be controlled by your PLCnext Engineer instance, the default (pre-installed) Phoenix Contact certificate must be replaced by your owner-specific certificate in the PLCnext Technology controller and PLCnext Engineer must be adapted accordingly.
    Refer to the topic "Network Security: Certificates enable Secure Connection" for details.

  • Logon to the PLCnext Technology controller with a particular user role ensures that the user is known and authorized to access/control the controller.
    You must set up the User and Role Management accordingly. Refer to section "Network Security: Authentication with User Role and Password" for details.
  • Security-related logging on the PLCnext Technology controller: Logs the user, data and time of the login to the controller as well as the executed commands, state changes, etc.
    Evaluate these log files regularly.
Protection of data transmission between the integrated OPC UA server and its clientsPLCnext Engineer implements features for securing the data connections between the OPC UA server integrated in the PLCnext Technology controller and the connected OPC UA clients.

Refer to the topic " Network Security: OPC UA Server Security Settings " for details.
Protection of data transferred via HMI and WBM (Web Based Management).The HMI data of your project are stored on the controller in the internal Web Server. Using a web browser as client, these data and the variables values (stored in the controller's GDS Global Data Space) are accessed via the Internet. When opening the HMI pages, this data transmission is secured via certificates and default web technologies. Therefore, a login with a user name and password is implemented.

The following applies:
  • HMI User and Role Management must be defined according to your security requirements.
  • Security must be enabled for your HMI application.
  • A Login page must be called first, when launching the HMI application. PLCnext Engineer provides a template for such a page.
  • Access rights to HMI pages/HMI objects must be enforced.
Refer to the help chapter "Security for HMI" for details.