EcoStruxure Building Management - System Hardening Guide
EcoStruxure Building Management - System Hardening Guide
System
Hardening Guide
04-20037-02-en
December 2021
Internal
Copyright © 2021 Schneider Electric. All rights reserved.
The Schneider Electric brand and any registered trademarks of Schneider Electric Industries SAS referred to in this guide are the sole property
of Schneider Electric SA and its subsidiaries. They may not be used for any purpose without the owner's permission, given in writing. This guide
and its content are protected, within the meaning of the French intellectual property code (Code de la propriété intellectuelle français, referred to
hereafter as "the Code"), under the laws of copyright covering texts, drawings and models, as well as by trademark law. You agree not to
reproduce, other than for your own personal, non-commercial use as defined in the Code, all or part of this guide on any medium whatsoever
without Schneider Electric's permission, given in writing. You also agree not to establish any hypertext links to this guide or its content. Schneider
Electric does not grant any right or license for the personal and non-commercial use of the guide or its content, except for a non-exclusive
license to consult it on an "as is" basis, at your own risk. All other rights are reserved.
Trademarks and registered trademarks are the property of their respective owners.
System 04-20037-02-en
2 December 2021
Internal
Contents
1 EcoStruxure Building Operation.............................................. 4
1.1 Overview ....................................................................... 4
1.2 Important Concept ......................................................... 4
1.3 BMS Equipment and Network Requirements................... 5
1.4 Server Platform Best Practices ....................................... 6
1.5 Server Platform Additional Considerations ...................... 8
1.6 Security Capability ......................................................... 8
1.7 Security Deployment .................................................... 14
1.8 Security Hardening Guidelines ..................................... 15
1.9 How To Securely Dispose Product................................ 21
1.10 How To Securely Operate Product.............................. 21
1.11 How To Manage Security Accounts ............................ 21
1.12 In Summary ............................................................... 22
2 SpaceLogic BACnet/IP Controllers ....................................... 23
2.1 Overview ..................................................................... 23
2.2 Important Concept ....................................................... 23
2.3 BMS Equipment and Network Requirements................. 24
2.4 SpaceLogic IP Controller Best Practices....................... 25
2.5 SpaceLogic Controller Additional Considerations ......... 26
2.6 Security Capability ....................................................... 26
2.7 Security Deployment .................................................... 28
2.8 Security Hardening Guidelines ..................................... 28
2.9 How To Securely Dispose Product................................ 31
2.10 How To Securely Operate Product.............................. 32
2.11 How To Manage Security Accounts ............................ 32
2.12 In Summary ............................................................... 32
System 04-20037-02-en
3 December 2021
Internal
1 EcoStruxure Building Operation
1.1 Overview
Ensuring the EcoStruxure Building Management integration is installed
securely is key to the overall security envelope of the building. This
chapter discusses integration security configurations that need to be
consider ensuring the overall security meets “best practice” standards.
There are two general classes of network devices commonly used in BMS
integrations:
While BMS products generally have many of the same network security
features found in network protective devices; for many reasons those
BMS features are not to be used as substitutes for the equivalent network
protective devices.
System 04-20037-02-en
4 December 2021
Internal
The following “Requirements” are a MUST for all BMS network
implementations:
System 04-20037-02-en
5 December 2021
Internal
A common security risk is failure to adequately maintain user accounts.
EcoStruxure BMS servers provides connectivity with Active Directory to
assist with account management. When Active Directory is not in use, a
manual process will be needed. It is very important to periodically review
all user accounts and to disable or remove all users who no longer have a
valid reason for accessing the BMS products.
Best Practice #5 – Ensure all BMS Windows servers are backed up,
validated and secured.
A robust backup practice is the best insurance available for handling
unexpected security issues. From Disaster Recovery to recovering a
System 04-20037-02-en
6 December 2021
Internal
failed device, up-to-date backups speed recovery efforts. Beyond simply
performing periodic backups, there should be a practice that validates
each backup and ensures it is possible to restore it. All backups should
be encrypted and securely stored.
System 04-20037-02-en
7 December 2021
Internal
Best Practice #6 – Ensure user passwords meet minimum requirements.
The Customer’s credential and/or password requirements must be
adequately incorporated into the Windows environment. For EcoStruxure
BMS servers using Active Directory, it is important to ensure all required
Windows configurations have been completed in a secure manner.
System 04-20037-02-en
8 December 2021
Internal
Admin logon password management (v1.3)
For more information, see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=4278
Certificate functionality
The EcoStruxure Building Operation software supports certificates.
Certificates are electronic credentials used to certify the identities of
computers, and other entities on a network.
• Self-signed certificates
• Default certificates (v1.4)
• Certificate Authority certificates (v1.6)
System 04-20037-02-en
9 December 2021
Internal
Password blocklist (v1.7):
You can block use of certain easy-to-guess passwords. A default list is
loaded from the factory.
Authorization
Confidentiality
System 04-20037-02-en
10 December 2021
Internal
Clickjacking protection options (v1.9)
For more information, see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=11679
Integrity
The system does not have any ordinary means to alter audit trail
information.
Secure boot
SpaceLogic server Secure Boot is available, to ensure the authenticity of
Schneider Electric firmware. (v4.0)
System 04-20037-02-en
11 December 2021
Internal
Basic protection against program and data at rest modification.
Optional support for single or dual authentication at change. (v3.0) For
more information, see https://ecostruxure-building-
help.se.com/bms/Topics/show.castle?id=13060
Document Policy
You can increase the security in your system by configuring the
document policy. The document policy controls which file types a user
can open, save, and import. For more information, see
https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=10952&locale=en-
US&productversion=nextrelease&prerelease=true&a=1
System 04-20037-02-en
12 December 2021
Internal
Firewall
You can configure the devices that are allowed to communicate with the
SpaceLogic AS-P and AS-B server to prevent connection attempts from
unauthorized devices. The IP addresses of the devices that are allowed
to communicate are added to the allow list. For more information, see
https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=10333
Connect Agent
To prevent data transfer over the cloud server, you can disable the
transfer of system information and crash information of the Enterprise
Central and the Enterprise Server and its SpaceLogic server. For more
information, see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=10310
System 04-20037-02-en
13 December 2021
Internal
Timely response to events
Resource availability
System 04-20037-02-en
14 December 2021
Internal
software is blocked. For more information, see
https://developer.mozilla.org/en-
US/docs/Web/Security/Securing_your_site/Turning_off_form_autocompleti
on
Certificate functionality
• Ensure trusted self-signed or Certification Authority certificates are used.
• Ensure there is a process in place for maintenance and renewal of
certificates.
System 04-20037-02-en
15 December 2021
Internal
o The numeric character can be the first or last character, such as
“123password”.
o A password contains at least 1 special character: !”#$%&’()*+,-
./:;?@[\]^_`{|}~´.
o The special character can be the first or last character, such as
“password!”.
Password blocklist
• You can block the use of certain easy-to-guess passwords. A default list
is loaded from the factory. For adding more passwords to the blocklist,
contact Schneider Electric.
Authorization
System 04-20037-02-en
16 December 2021
Internal
• Ensure processes are in place to regularly inspect the account
management configuration. For more information, see https://ecostruxure-
building-help.se.com/bms/Topics/show.castle?id=12215
Confidentiality
System 04-20037-02-en
17 December 2021
Internal
https://www.enterprisedb.com/blog/how-to-secure-postgresql-security-
hardening-best-practices-checklist-tips-encryption-authentication-
vulnerabilities
• Ensure separate accounts are used for 3rd party access of the External
Log Storage, In particular, you want to separate the account that
EcoStruxure Building Operation is using to access the database.
• Ensure encrypted communication is used between EcoStruxure Building
Operation servers and TimescaleDB/PostgreSQL. For more information,
see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=13446
Integrity
Auto logoff
• Ensure inactivity logoff is activated with a sufficiently low timeout. For
more information, see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=8870
Secure boot
• Ensure that you use Secure Boot versions of server hardware and edge
servers.
System 04-20037-02-en
18 December 2021
Internal
Basic protection against program and data at rest modification.
• Ensure Compliance Pack is activated, change control is enabled and the
appropriate settings are deployed in accordance with customer
requirements. For more information, see https://ecostruxure-building-
help.se.com/bms/Topics/show.castle?id=13060
Document Policy
• Ensure that only appropriate document types are enabled. Disable
document types that are not needed. For more information, see
https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=10952&locale=en-
US&productversion=nextrelease&prerelease=true&a=1
System 04-20037-02-en
19 December 2021
Internal
Restricted data flow
Firewall
• Ensure the firewall in SpaceLogic servers and Enterprise servers is
configured appropriately. For more information, see https://ecostruxure-
building-help.se.com/bms/topics/show.castle?id=10333 and Microsoft
Windows documentation.
System 04-20037-02-en
20 December 2021
Internal
Resource availability
System 04-20037-02-en
21 December 2021
Internal
• Ensure processes are in place to regularly inspect the account
management configuration. For more information, see https://ecostruxure-
building-help.se.com/bms/Topics/show.castle?id=12215
1.12 In Summary
Maintaining the security of BMS integrations relies upon the proper use of
various cybersecurity tools. From routers to VPNs to proper server
hygiene, security is achieved through constant diligence to basics. This
document provides common security hardening information. The reader
is directed to contact cybersecurity professionals for more in-depth
analysis and recommendations.
System 04-20037-02-en
22 December 2021
Internal
2 SpaceLogic BACnet/IP Controllers
2.1 Overview
Ensuring the EcoStruxure Building Management integration is installed
securely is key to the overall security envelope of the building. This
document discusses integration security configurations that need to be
considered to ensure that overall security meets “best practice”
standards.
There are two general classes of network devices commonly used in BMS
integrations:
• BMS Products
While many BMS products are hosted on industry standard platforms (like
Windows or Linux), the BACnet/IP controllers (MP-C, MP-V, RP-C and RP-
V) are “pure BACnet” products. They use BACnet IP to talk to the AS
controllers. A secure implementation of the BACnet IP protocol is
currently available in EcoStruxure Building Operation. It is not currently
available at the controller level, however. This means that required
network protection must come from the proper use of network protective
devices.
System 04-20037-02-en
23 December 2021
Internal
using the AS-P server. This device has been designed to provides the
required isolation for IP based controllers on the BMS network segment.
System 04-20037-02-en
24 December 2021
Internal
Requirement #5 – BACnet/IP controller backups MUST BE being routinely
completed, validated and secured.
A robust backup practice is the best insurance available for handling
unexpected security issues. From disaster recovery to recovering a failed
device, up-to-date backups speed recovery efforts. Beyond simply
performing periodic backups however, there needs to be a practice that
validates each backup and ensures it is possible to restore it. All backups
should be encrypted and securely stored.
System 04-20037-02-en
25 December 2021
Internal
WebServices disabled. For more information, see https://ecostruxure-
building-help.se.com/bms/Topics/show.castle?id=14417.
For the BACnet/IP controllers, units are shipped from the factory in a “low
security” mode that supports the configuration and commissioning of the
devices. Once the device is “hosted” by the Automation Server, it
automatically switches to a more secure, or secure-by-default state. See
the individual items below to determine which features follow this security
strategy.
Certificate functionality
The SpaceLogic web services functionality requires the installation of
HTTPS certificates. For more information, see
https://docs.microsoft.com/en-us/azure/rtos/netx-duo/netx-duo-web-
http/chapter1.
System 04-20037-02-en
26 December 2021
Internal
• B-OWS Restrictions -- This restriction comes into force
automatically when the MP or RP controller is hosted. For more
information, see https://ecostruxure-building-
help.se.com/bms/topics/show.castle?id=12529
• Serial Bus Disable (Port reference) – Serial bus ports on the MP &
RP controllers may be disabled by removing the port reference on
any consuming resource.
Authorization
The web services feature is the only controller feature that allows a level
of authorization. For more information, see https://exchange.se.com/ and
search for the document “SpaceLogic Web Service API".
System 04-20037-02-en
27 December 2021
Internal
Confidentiality
Web services provide a secure, always on, HTTPS connection. For more
information, see https://exchange.se.com/ and search for the document
“SpaceLogic Web Service API".
Integrity
Resource availability
System 04-20037-02-en
28 December 2021
Internal
The RPC web service must be enabled and can be disabled on demand.
For more information, see https://ecostruxure-building-
help.se.com/bms/Topics/show.castle?id=14417.
Certificate functionality
• Ensure to use of trusted self-signed or Certification Authority
certificates.
• Ensure a process is in place for maintenance and renewal of
certificates.
Web services have their own password policy and enforcement system
which is separate from other EcoStruxure BMS functionality. For more
information, see https://exchange.se.com/ and search for the document
“SpaceLogic Web Service API".
Authorization
Confidentiality
System 04-20037-02-en
29 December 2021
Internal
Standard BACnet/IP does not provide encrypted data transmission. For
systems requiring additional “on the wire” security, using sealed metal
conduits may provide similar protection.
Web services provides data encryption at the HTTPS protocol level. For
more information, see https://exchange.se.com/ and search for the
document “SpaceLogic Web Service API".
Integrity
System 04-20037-02-en
30 December 2021
Internal
Timely response to events
Resource availability
System 04-20037-02-en
31 December 2021
Internal
2.10 How To Securely Operate Product
Since the controllers are BACnet/IP devices, the concept of “Secure
Operation” is limited. For more information on each controller type:
The CRS modules rely upon their hosting device for all available security.
As such, secure operation of a CRS module relies upon the security
associated with controller it is connected to and the security of the larger
integration.
The MP controllers have no user account system and thus there are no
security accounts to manage.
The CRS module has no user account system and thus there are no
security accounts to manage.
2.12 In Summary
Maintaining the security of BMS integrations relies upon the proper use of
various Cyber Security tools. From routers to VPNs to software server
hygiene, security is achieved through constant diligence to the basics.
This document provides common security hardening information. The
System 04-20037-02-en
32 December 2021
Internal
reader is directed to contact Cyber Security professionals for more in-
depth analysis and recommendations.
System 04-20037-02-en
33 December 2021
Internal