SAES-Z-010 Process Automation Networks
SAES-Z-010 Process Automation Networks
1 Scope............................................................ 2
2 Conflicts and Deviations................................ 4
3 References.................................................... 4
4 Definitions...................................................... 5
5 Process Automation Network Design............ 7
6 Wiring System............................................. 13
7 PAN Router and Switch Access and
Monitoring Design Requirements........ 13
8 Operating System and
Network Device Hardening.................. 16
9 Centralized Patch Server............................ 16
10 Backup and Recovery................................. 17
11 System Testing............................................ 17
12 Documentation............................................ 17
1 Scope
1.1 This standard establishes the requirements for design, installation, configuration
and commissioning of Process Automation Networks (PANs), which shall
establish network connectivity between the Saudi Aramco Process Automation
Systems, the Saudi Aramco corporate network, and third party external
networks. Process Automation Network (PAN) is a plant wide network
interconnecting Process Control Systems (PCS) that provides an interface to the
Corporate Network. A PAN does not include proprietary process control
networks provided as part of a vendor's standard process control system.
Parties involved in the commissioning of PANs are required to comply with this
standard.
1.2 Specification of all systems installed on the Process Automation Network layer
shall follow their respective standard and are excluded from this standard.
1.3 Geographically spread Remote Terminal Units (RTU's) are not covered in this
standard.
1.4.2 The requirements and guidelines governing the engineering, design and
installation of Supervisory Control and Data Acquisition (SCADA) is
covered in SAES-Z-004.
1.4.5 This entire standard may be attached to and made a part of purchase
orders.
Page 2 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Page 3 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
2.1 Any conflicts between this standard and other applicable Saudi Aramco
Materials System Specifications (SAMSSs), Engineering Standards (SAESs),
Engineering Procedures (SAEPs), Standard Drawings (SASDs), or other
Mandatory Saudi Aramco Engineering Requirements (MSAERs) shall be
resolved in writing by the Company or Buyer Representative through the
Chairman, Process Control Standards Committee, Process & Control Systems
Department, Dhahran.
2.2 Direct all requests to deviate from this standard in writing to the Company or
Buyer Representative, who shall follow internal company procedure SAEP-302
and forward such requests to the Manager, Process & Control Systems
Department of Saudi Aramco, Dhahran.
3 References
The selection of material and equipment and the design, construction, maintenance, and
repair of equipment and facilities covered by this standard shall comply with the latest
edition of the references listed below, unless otherwise noted.
Page 4 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Corporate Policy
INT-7 Data Protection and Retention
4 Definitions
Page 5 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Interfaces: Software modules for collecting data from data sources or sending data to
other systems. Typical data sources are Distributed Control Systems (DCSs),
Programmable Logic Controllers (PLCs), OPC Servers, lab systems, and process
models. However, the data source could be as simple as a text file.
L3 Switch: A network device that joins multiple computers together at the network
protocol layer of the Open System Interconnection (OSI) model eliminating the need for
a router. L2 network switches operate at layer two (Data Link Layer) of the OSI model.
Local Area Network (LAN): A private data communications network, used for
transferring data among computers and peripherals devices; a data communications
network consisting of host computers or other equipment interconnected to terminal
devices, such as personal computers, often via twisted pair or coaxial cable.
Logical Separation: use of different Layer 3 network subnets or software running on
common hardware to separate two or more networks and systems.
Logs: Files or prints of information in chronological order.
OPC: OPC (originated from OLE for Process Control, now referred as open
connectivity via open standards) is a standard established by the OPC Foundation task
force to allow applications to access process data from the plant floor in a consistent
manner. Vendors of process devices provide OPC Servers, whose communications
interfaces comply with the specifications laid out by the task force (the OPC Standard),
and any client software that complies with that standard can communicate with any of
those servers without regard to hardware releases or upgrades. The connection between
the client and the OPC Server is either through the Microsoft COM interface or through
OLE Automation, and the client accesses data from the data cache maintained by the
OPC Server or requests that the server read the device directly.
Physical Separation: use of different hardware to separate two or more networks and
systems.
Process Automation Network (PAN): is a plant wide network interconnecting
Process Control Systems (PCS) that provides an interface to the Corporate Network.
A PAN does not include proprietary process control networks provided as part of a
vendor's standard process control system.
Scan Node: Scan Nodes run interfaces. Interfaces get the data from the data sources
and send it to the plant historian servers. Each different data source needs an interface
that can interpret it.
Secured Node: A server or a workstation is located in a room with controlled physical
access. It is assigned with a fixed IP address and the remote desktop service is disabled;
however, remote desktop client can be enabled. Access to the room must be logged
with information such as, Name, Date, time of entry/exit and type of activity.
Page 6 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Abbreviations:
CCTV - Closed Circuit Television
CSMA/CD - Carrier Sense Multiple Access / Collision Detection
DCS - Distributed Control Systems
DAHS - Data Acquisition and Historization System
DHCP - Dynamic Host Configuration Protocol
DNS - Domain Name System
FTP - File Transfer Protocol
IP - Information Protocol
LAN - Local Area Network
PAN - Process Automation Network
OSI - Open Systems Interconnection
SCADA - Supervisory Control & Data Acquisition
TCP - Transmission Control Protocol
UDP - User Datagram Protocol
UPS - Uninterruptable Power Supply
VLAN - Virtual LAN
VMS - Vibration Monitoring System
WiFi - Wireless Fidelity
5.1 The PAN shall be based on IEEE 802.3 CSMA/CD (Ethernet) standard.
The backbone shall be based on Layer 3 multi-protocol switches or routers.
5.2.1 The network design shall provide physical and logical separation between
PAN and all other networks such as the Saudi Aramco Corporate Network.
Page 7 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
5.3 Network traffic through the firewall should be limited to secured nodes and
through selected source/destination IP addresses and TCP/UDP ports and services.
5.4 PAN can be used to integrate auxiliary systems on a single network such as
Emergency Shutdown Systems, Compressor Control Systems, Vibration
Monitoring Systems, etc., for the purpose of centralizing the engineering and
maintenance activities of the plant.
5.5.1 Remote access from Corporate Network and Internet for control
purposes even through the plant firewall is not permitted.
Page 8 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
This section applies to Firewalls protecting the PAN from the corporate data
network, and any firewall protecting the PAN from third-party networks
(e.g., CoGen).
5.6.5 Network traffic through the firewall shall be limited to secured nodes’
communications and filtered based on source/destination IP addresses
and TCP/UDP ports. Blocking shall be enabled for both inbound and
outbound communications.
5.6.7 The firewall represents a security and functionality boundary, thus, in the
event of a connection loss to the corporate network, full functionality of
plants networks and systems shall be maintained internally. For this
purpose, plant systems shall not be configured to rely on IT provided
services such as File / Print Sharing, Internet, Intranet, DNS, Backup, and
Active Directory. In contrast, plant systems can be configured to use other
IT services such as Antivirus updates, security patches, and e-mail for
monitoring and alerting messages. In case of using Antivirus services and
security patches via the corporate network, manual update method and
procedure as a backup solution shall be available for system and network
administators for connection loss to the corporate network and emergency.
5.6.8 The firewall filter rules shall not allow insecure services such as Telnet,
FTP, NetBios to traverse the firewall.
Page 9 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
5.6.10 The PAN backbone Layer 3 switches or routers shall assume the routing
functionality internally for the PAN and interface with the Corporate
Network router through a dedicated firewall hardware. For small PANs, it
is recommended to include redundant firewalls and Layer 3 switches
interfacing with the corporate network; however, this redundancy shall be
installed for all other PANs. The firewall can be integrated with Layer 3
switches or routers for only small and scatted PANs such as isolated
GOSP or pump station with prior approval from P&CSD Manager.
The firewall shall be configured to limit Internet Protocol (IP) routes
advertisement to the Corporate Network router to those servers requiring
access by other servers on the Corporate Network. Other subnets assigned
to PAN systems shall not be advertised to the Corporate Network router.
5.7 External Connection to Third Party Systems (non-Saudi Aramco facilities such
as CoGen)
5.7.1 Third party interface require a dedicated firewall on the Saudi Aramco
plant site.
5.7.2 Communication between third party plant sites and Saudi Aramco plant
sites shall be limited to secured nodes’ communications and filtered
based on source/destination IP addresses and TCP/UDP ports.
5.9 All TCP/IP addressing shall be obtained from Saudi Aramco IT Organization.
5.11 Dynamic Host Configuration Protocol (DHCP) shall not be used on the PAN.
Page 10 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Page 11 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Page 12 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
6 Wiring System
6.3 Fiber Optic Cable routed to another cabinet shall be run in Polyethylene
Corrugated Loom Tubing or flexible conduit at a minimum.
6.4 Corrugated Loom Tubing or flexible conduit is not required inside cabinets.
6.5 PAN cabling shall conform to “The Data Link” requirements in SAES-J-902
(Electrical Systems for Instrumentation).
6.6 PAN cabinets shall be designed in accordance with Saudi Aramco Materials
System Specification 34-SAMSS-820 without affecting the accessibility and
safety.
7.1.1 Management of passwords, User IDs and User Role privileges of servers
and workstations shall be done via a central server connected to the PCS
system.
Page 13 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
7.1.5 The system should issue a password expiration notification to the user
at least 10 days prior to password expiry date.
7.1.9 PAN routers and switches should monitor and record all failed login
attempts.
7.2.2 Repeated login failures shall be logged with the location, date, time and
user account used.
7.2.3 At login time, every user should be given information reflecting the last
Page 14 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
login time and date, if supported by the system or application. This will
allow unauthorized system usage to be detected.
7.3 Using wireless technologies such as ISA 100.11a and WiFi in the Process
Automation Network or to extend the PAN are permitted with prior approval
from P&CSD Manager.
7.4 PAN equipment that contains data storage shall be sanitized in compliance with
GI-0299.120, when disposed of.
7.5.1 The PAN shall be configured for the monitoring and recording of:
Unexpected users logged on the system.
Users from unexpected hosts logged on.
Users logged on at unexpected times.
Login failures.
Logins from unknown hosts.
Failed access to system files.
Changes to the system date and/or time.
System reboots and shutdowns.
Use of remote console facility.
Integrity of system security files.
Users without passwords.
Users with passwords similar to their login names.
Users with passwords of fewer than six characters.
Users who are not required to change their passwords every 120 days.
Users who are not required to use unique passwords.
Inappropriate accesses to system files.
7.5.2 PAN switches and routers shall be configured to capture all related
events to detect performance and availability related problems.
This must be a vendor approved solution.
Page 15 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Memory utilization
IO rates (i.e., physical and buffer) and device utilization
Network utilization (e.g., transaction rates, error and retry
rates)
7.6.1 The PAN hardware components such as cables, switches, routers and
modems are vulnerable to vandalism and electronic eavesdropping and
shall be physically secured.
8.1 PAN equipment shall be deployed with vendor latest supported security
hardened operating system.
8.2 The secure configuration baselines shall be thoroughly tested by the vendor.
The vendor shall enable the PAN administrators to support and administrate the
PAN equipment after deployment and commissioning.
8.3 PAN equipment with unused physical ports/interfaces shall be disabled prior to
commissioning.
A centralized patch server shall be located on the PAN to distribute operating systems’
security patches, antivirus updates, and vendor application software to stations located
on PAN. This centralized server shall be used for stations connected to the PAN, which
are part of other systems such as PCS or emergency shutdown systems.
Page 16 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
A complete backup of PAN switches, routers, and PAN systems configuration shall be
developed for new installations or upgrades of PAN equipment. This includes:
10.4 One copy shall be stored in a secure onsite location and the other copy shall be
maintained at a secure off-site location.
11 System Testing
11.1 Testing shall address all Plant components, networking and interfaces to
external systems and to legacy applications/system. Formal testing shall
minimally comprise Factory Acceptance Test (FAT) per SAEP-1634, Site
Acceptance Tests (SAT) per SAEP-1638, Performance Acceptance Tests (PAT),
and Preparation of Integration Test Procedure Document SAEP-1630.
11.2 Comprehensive test plans and test specifications such as SAEP-701 “Plant Ethernet
Network Test Procedure” shall be followed for all plant platforms, networking,
applications, integration components, interfaces to external systems and legacy
applications/systems, and any additional technology content of the project.
12 Documentation
13.1 Standard vendor manuals and catalogs shall be provided in CD-ROM or other
electronic media. Formats to be in PDF or HTML.
13.3 Final project specific documents in two signed hard copies plus two (2) sets of
CD-ROM in Microsoft Word.
13.4 A plant network drawings layout showing the PAN logical and physical design
and its interconnection to the Corporate Network.
Page 17 of 18
Document Responsibility: Process Control Standards Committee SAES-Z-010
Draft Date: 1 September 2012
Next Planned Update: 1 September 2017 Process Automation Networks
Revision Summary
1 September 2012 Major revision to include value engineering study’s comments and recommendations.
Page 18 of 18