Understanding the Impact of Cyber Breach on Safety PLC Program Modifications

Question:

Hello everyone, in my search on the site, I came across a thread discussing safety PLCs and editing safety tasks that closely relates to my question. Unfortunately, it doesn't fully address the concerns raised by our IT and cybersecurity auditor. I have elaborated on the questions based on the information provided in the aforementioned thread: If an unauthorized individual manages to breach our firewall, gain access to one of our Programming VMs running the necessary Rockwell software for editing our Safety PLC (L81ES), obtains validation from the Rockwell license server, logs into the safety PLC, and maliciously alters the safety part of the controller code: - Will the PLC need to enter program mode for the logic changes to take effect? - If modifications are made to the safety program(s) without generating a new safety signature, what will happen when the PLC is power cycled? Will it continue running the 'old' code, switch to the 'new' code, or remain idle due to the absence of a safety signature? Although I have reviewed various manuals, this level of detail seems to exceed their coverage. It may also be too specialized for YouTube tutorials, as they primarily focus on initial safety program setup rather than editing procedures. Unfortunately, I am unable to conduct test trials myself as we only have one safety controller on-site, and our spare is currently being used for remote development by a contractor.

Top Replies

Configuring the safety controller depends on various options available to you. These include using FactoryTalk Security, setting up a Safety Signature, enabling 'Protect Signature in Run Mode,' locking the Safety Application with a password, utilizing a Key Switch 'RUN' mode, and implementing Change Detection in your HMI application. It is important to protect your safety system with multiple layers of security, such as multiple firewalls with different passwords from different vendors. If you are considering making safety changes or implementations, attending a Rockwell training course is recommended. Different regions have varying legislation regarding safety implementations, so it is crucial to be competent in this area. Having the necessary certifications and training can help defend your competence in case of mistakes or issues.

If you're wondering, no, there's no need to switch to program mode for making changes. Online edits are permitted in the safety system without requiring a safety signature, just like in a regular Logix system. It's important to note that a safety controller without a safety signature is essentially a costly ControlLogix. Any modifications made will take effect immediately in code execution when in Test or Assembled edits mode. The executed code will remain the same before and after a power cycle, unless there's memory corruption or if booting from an SD/CF card is configured. The safety features include verification and validation of code changes, restricting code changes through safety signatures and locks, and tracking the current code state back to test and design documents. These additional precautions ensure safety and compliance in the system.

According to bevanweiss, certain changes can be made in the safety system without needing to enter program mode, similar to the normal logix system. However, without a safety signature, a safety controller is essentially just an expensive controllogix. The responsibility for programming the Safety PLC lies with the Service Provider handling the robot's programming as part of their deliverables. Seeking independent sources for answers is important in this scenario. Changes made will take immediate effect in code execution during Test or Assembled edits, with the executed code remaining the same before and after a power cycle, unless memory corruption is detected or an SD/CF card is used for booting. The concept of a Safety signature may be unclear, but it adds an extra layer of security contributing to overall safety. This includes verification and validation of code changes, restriction of changes through safety signatures and locks, and traceability of the current code state back to test and functional design documents. Thank you for the overview!

In an insightful post, bevanweiss mentioned the importance of configuring the safety controller properly. There are numerous options available to enhance safety measures. Some key steps include implementing FactoryTalk Security, ensuring Safety Signature is configured, enabling 'Protect Signature in Run Mode,' locking the Safety Application with a password, and considering Key Switch 'RUN' mode. Change Detection in the HMI application and using multiple firewalls for added security are also recommended practices. Attending training courses is essential for ensuring competence in safety implementations. Additionally, it's important to work with a qualified Service Provider for safety changes to avoid potential mistakes. By following these guidelines, you can strengthen the safety protocols in your industrial setting. Thank you for sharing this valuable information!

The implementation of safety measures, known as a safety signature, should be completed during the safety commissioning phase before proceeding with the non-safety functional commissioning of the machine. It is important to note that port 44818 may inadvertently be exposed to the internet, as shown on platforms like Shodan. To prevent unauthorized access, it is recommended to establish strong security protocols to deter potential intruders. Avoid allowing third-party service providers to install their own 4G/5G modem for remote diagnostics, as this may compromise the security of the system. Stick to using a corporate VPN setup and a jump box with appropriate software installed for remote access instead. In my experience with safety procedures, I prioritize maintaining the Safety Signature integrity and ensuring it remains unchanged in Run mode, along with utilizing a Safety Lock password. By upholding the Safety Signature protocol, I am confident in my liability protection. Any alterations to the safety code by the end user will result in a mismatch with the documented commissioning data. Since the safety signature is impacted by timestamps, any attempt to revert to the original settings will be flagged by modified PLC times, indicating an attempt to cover tracks.

Based on my experience with Rockwell's safety PLCs, the PLC will need to enter program mode for any changes to take effect, including malicious alterations. So if your PLC is running in Run mode, immediate changes aren't likely. Regarding the second part of your question, my understanding is that these PLCs have safeguards built in, wherein any changes made without a new safety signature will cause a fault. So in effect, if it's power cycled and no new valid safety signature is in place, I'd expect the controller to go into a Fault state rather than running the 'old' or 'new' code. However, I would highly recommend reaching out to a Rockwell representative for a concrete answer given the critical importance of these operations and the potential impacts of a security breach. They might also be able to suggest additional safeguards or protocol recommendations based on your specific circumstances.

Hello, you're tackling some quite complex and specialized questions here, kudos for being detail-oriented! To the best of my knowledge, after the PLC is accessed and changes are made, the controller does need to be put in program mode for the changes to take effect. If the alterations are made without generating a new safety signature, upon the next power cycle, the PLC will go in a faulted state due to signature validation failure. It won't run the new or old code, it just stops to ensure maximum safety under uncertain conditions. That said, given this topic's complexity, I'd strongly advise reaching out to Rockwell support or a professional safety expert to confirm this and address further concerns. It's always better to be safe than sorry when dealing with safety PLCs.

Hey there! Quite a complex situation you've got. While I'm not an IT expert, I do have some experience with PLCs. If my understanding of Rockwell's safety PLCs is correct, the controller needs to enter program mode for logic changes to take effect. It won't automatically switch to new logic in the run mode. Concerning your second question, if changes were made to the safety program without generating a new safety signature, I believe the controller should fail the safety signature test upon power cycling and halt operation due to a mismatch in signatures. This is part of its failsafe function to prevent unauthorized edits. But given the complexity of your scenario, I would strongly recommend reaching out to Rockwell's technical support for a more thorough understanding. They're very helpful and knowledgeable.

This is a really crucial question, especially with the increasing focus on cybersecurity in automation. To address your points, the L81ES PLC generally does require entering program mode to make changes to the logic; however, if someone bypasses security checks, they could potentially make changes that wouldn't be immediately apparent. Regarding safety signatures, if modifications are made without generating a new one, you’d typically find that the PLC could either revert to the last known safe state when rebooted or throw errors if it detects an invalid signature, which would prevent it from running. It's definitely a complex situation, and I’d recommend discussing with Rockwell or your safety certifying body for the most accurate guidance tailored to your setup. Stay safe!

This is a really important concern, especially with the increasing focus on cybersecurity in industrial environments! To answer your question, for the L81ES PLC, typically any modifications to the safety logic would require the controller to be in program mode for those changes to be applied. If someone altered the safety code without generating a new safety signature, upon a power cycle, the PLC would usually revert to the last known valid program with a valid safety signature—so it wouldn’t run the unsafe code. However, if that code were somehow to be loaded without a signature, you might run into issues where the PLC could either lock up or enter a fault state, preventing it from restarting properly. It's crucial to ensure strict access controls are in place to mitigate these risks. Have you considered reaching out to Rockwell directly or consulting with a cybersecurity expert who specializes in industrial environments for specific guidance?

More Replies →

Streamline Your Asset Management
See How Oxmaint Works!!

✅   Work Order Management

✅   Asset Tracking

✅   Preventive Maintenance

✅   Inspection Report

We have received your information. We will share Schedule Demo details on your Mail Id.

To add a comment, please sign in or register if you haven't already..   

Frequently Asked Questions (FAQ)

FAQ: 1. If an unauthorized individual alters the safety part of the controller code in a Safety PLC (L81ES), will the PLC need to enter program mode for the logic changes to take effect?

Answer: - Answer: Yes, typically the PLC would need to enter program mode for the logic changes to take effect, as modifications to the safety program usually require the PLC to be in a specific mode for the changes to be applied.

FAQ: 2. What happens if modifications are made to the safety program(s) without generating a new safety signature, and the PLC is power cycled?

Answer: - Answer: If modifications are made to the safety program without generating a new safety signature, the PLC may continue running the 'old' code, switch to the 'new' code, or remain idle due to the absence of a safety signature. The exact behavior would depend on the PLC's configuration and how it handles safety program integrity checks.

FAQ: 3. How can one ensure the security of safety PLC programs against unauthorized access and modifications?

Answer: - Answer: To enhance security, it is important to implement robust access controls, network segmentation, regular security audits, intrusion detection systems, and encryption measures to protect safety PLC programs from unauthorized access and modifications. Working closely with IT and cybersecurity teams is crucial to identify and address vulnerabilities proactively.

Ready to Simplify Maintenance?

Join hundreds of satisfied customers who have transformed their maintenance processes.
Sign up today and start optimizing your workflow.

Request Demo  â†’