cRSP IT Security Concept

Siemens Ingenuity for life

Document Objective

The Siemens common Remote Service Platform (cRSP) is the IT platform used throughout the group for implementing remote access to IP-based equipment. This security concept describes the measures taken by Siemens Smart Infrastructure to protect customer data and IT systems when using remote services. In its current version, this concept is applied to all Siemens security, fire safety, and building automation systems for which remote services are available over the entire life cycle.

Document Layout

This document is divided into two main sections: the general operating concept and the technical security concept.

The first section, the general operating concept for remote services, discusses the fundamental aspects of information security within Siemens. It introduces the topic of remote services for building technology, along with application-specific use cases for remote connections. This part also covers strategic security measures in data management and personnel selection, which are organizationally implemented for remote services.

It provides customers with a general understanding of data security in remote connections.

The second section, the technical security concept, details technical measures and advice on remote access, including access types and logging, secure IT infrastructure, protecting data transmissions, and protecting against attacks.

Technical components, processes, and procedures, such as authentication and authorization, are described in detail. This part is especially helpful for IT specialists interested in connection types or encryption methods.

Finally, an overview of various connectivity options is provided in the appendix.

Introduction

Data and information on building infrastructure must be available reliably, quickly, globally, and securely. Siemens common Remote Services meet all these requirements to the greatest extent.

Contents

General Operating Concept

Data Security as a Basic Requirement

Confidentiality and long-term partnerships are highly valued at Siemens. Therefore, data security is given the highest priority. Before implementing an enhanced service package with remote support, Siemens conducts an in-depth analysis of the situation, considering national and international regulations, technical infrastructures, and industry specifics.

Within the scope of proactive services, data is sent regularly via the existing secured connection from the systems to Siemens. This connection is established after successful authorization (see "Authentication and authorization" below).

Graph showing data points over time, with axes labeled 'HUR' and time stamps from 21:01:2015 to 23:30.

Remote Services for Building Technology

As modern systems and solutions become more interconnected, Siemens offers an additional service portfolio alongside existing on-site system service. This is based on remote support, providing enhanced flexibility and system availability.

Remote connections enable faster and more efficient determination of system issues and allow for quick, intelligent resolution from a remote location. Even when remote repairs are not possible, the information obtained through remote diagnosis helps the service technician provide the best possible and highly efficient on-site support, ensuring they are well-informed and equipped.

Furthermore, Siemens' proactive services take preventive action to avoid errors, minimizing system downtime.

Critical data, such as login data, is not stored in the cRSP.

Image of a digital lock with binary code flowing around it.

Use Cases for Remote Services

The following are use cases that may vary according to access type and duration:

The Remote Advantage

Remote service provides additional support to optimally service fire safety, security, and building automation systems amidst growing complexity. The advantages of cRSP include:

General Operating Concept (Continued)

Data Management

Siemens treats customer data as confidential and grants access on a need-to-know basis. This principle is supported by rule-based access mechanisms within a dedicated infrastructure and tool landscape. Data management measures are tailored to customer data protection requirements, data types, and applicable regulations.

Personnel Selection

Siemens service technicians and experts are trained in data protection and IT security, understanding the serious consequences of non-compliance. Only trained employees work in the Remote Service Center. Siemens employs strict selection criteria and requires ongoing training for its service technicians, ensuring customer data is handled securely.

Platform Availability

The availability of remote services is ensured by three data centers located in Germany, Singapore, and the United States. Each center's capacity is designed to prevent cRSP platform disruption during malfunctions. Disaster recovery (DR) and business continuity management (BCM) plans further enhance service availability.

Siemens CERT Auditing

The Siemens Computer Emergency Response Team (CERT) is an internal, independent team that develops preventive security measures and assesses the information security of the IT infrastructure.

Certification

Siemens was among the first organizations globally to implement an internationally valid information security management system (ISMS) according to ISO/IEC 27001 for remote services. The cRSP platform undergoes regular audits for effective protection and continuous improvement.

General Operating Concept (Continued)

You Determine How Access Takes Place

As a basic requirement, every service activity must be contractually authorized. Access is granted only for contractually agreed use cases.

To enable access to systems from outside the Siemens network, the Customer Web Portal (CWP) with enhanced security requirements (two-factor authentication) is used. In addition to setting up a connection, customers can explicitly bar access to individual destinations and enable them only when needed. Combined with log file retrieval upon successful access, this provides customers with full control over remote access to their systems.

Access Scenario Example

General Operating Concept (Continued)

Authentication and Authorization of Siemens Service Personnel

The central backend of the cRSP platform resides in a separate segment within the Siemens intranet. Siemens issues PKI certificates to employees. Each time a service technician logs into the cRSP portal, their access rights are verified using PKI and a strong authentication method involving a smart card. Defined access models are mirrored within the cRSP platform and translated into authorized IT system access levels, matched to the service technician's verified identity.

This procedure ensures that service technicians can only access specific areas of a system for which they have been expressly authorized in advance.

Authenticating and Authorizing Your Personnel

To enable access to your systems from outside the Siemens network, the Customer Web Portal (CWP) with enhanced security requirements (two-factor authentication) has been established. The CWP is located within the Siemens DMZ (Demilitarized Zone). Established users and their authorizations, similar to Siemens intranet users, are stored on a server in another network segment. Authentication occurs in the CWP using a user ID, password, and a mobile PIN. For web portal access, users enter their username, password, and mobile PIN or email.

For questions or assistance, please contact your local Siemens country organization.

Diagram illustrating network zones: Intranet Zone (Siemens engineer, CRSP Portal Server, Radius Server), DMZ (Access Server, CRSP DMZ, Authentification Server, CWP (Customer Web Portal) Server), and Internet (Customer, VPN, Customer System, 2 Factor Authentification, External client).

Technical Security Concept

Network Structure

To protect both your network and the Siemens intranet against threats, Siemens has secured the cRSP infrastructure within a DMZ. Service technicians do not establish end-to-end connections to your systems. Instead, connections terminate in the DMZ, which is protected by firewalls on both sides. A reverse proxy server establishes the connection to your system and mirrors incoming communication to the Siemens intranet. This prevents connections between the Siemens intranet and your network using unauthorized protocols, as the mirroring process only works with predefined protocols.

This architecture prevents:

Virtual Private Network (VPN) via a Broadband Connection

cRSP consistently uses a secure VPN tunnel over a broadband internet connection, offering maximum security, high data transfer rates, and high availability.

Diagram illustrating the network structure with Customer, Internet, DMZ, and Siemens (ASC) zones. It shows monitoring of system parameters via a CRSP access server and CRSP portal, with a secure tunneled connection via Virtual Private Network (VPN).

Technical Security Concept (Continued)

Security Measures for IPsec

Siemens utilizes the established IP Security (IPSec) standard with preshared secrets for encrypted and authenticated data transmission. A recommended minimum configuration includes preshared secrets consisting of an arbitrary string of at least 12 random characters. The Internet Security Association and Key Management Protocol (ISAKMP) is used for secure exchange of encryption keys. Encrypted Secure Payload (ESP) ensures data confidentiality through AES-256 encryption, while the SHA2 hash method provides data integrity and authenticity. Diffie Hellman key exchange with a 2048-bit key size (group 14) is used for key exchange security and Perfect Forward Secrecy (PFS).

Diagram illustrating Siemens Owned Access via IPSec: Internet Connection -> VPN Broadband IPSec -> Access Point -> Customer Network. Ports UDP 500, 4500, TCP 22 are shown. Also shows Siemens Intranet components like IPSec router, CRSP Portal, DB, Access Server, TSE Laptop.

Security Measures for SSL-VPN

As an alternative to IPSec VPN, Siemens offers a solution based on SSL VPN using state-of-the-art TLS 1.3. This solution can be installed on Windows or Linux (specific distributions only) and is also installed on the DigitalizationBox and Remote Solution Gateway. Before a connection is established, the device must be registered with a one-time password (OTP). This OTP is generated using the system's unique data and is valid only for its registration process. An SSL connection to the VPN server can only be established if the server certificate is signed by an internal Siemens Certification Authority (CA), ensuring that only the specific device can communicate with cRSP servers. An additional hardware-based hash prevents unauthorized devices from connecting to cRSP (system cloning).

Diagram illustrating Internet Based Connection via SSL VPN: Internet Connection -> SSL VPN Tunnel -> Access Point -> Customer Network. Port TCP 443 is shown. Also shows Siemens Intranet components like SSL VPN Server, Access Server, CRSP Portal, DB, TSE Laptop.

Diagram showing DigitalizationBox/Remote Solution Gateway connection via SSL VPN: Internet Connection -> SSL VPN Tunnel -> Access Point -> Customer Network. Port TCP 443 is shown.

Technical Security Concept (Continued)

Security Measures in the Customer Network

The following section lists the protocols and services used. Specific security measures or customized firewall functions for special applications or network segments are available depending on the chosen connectivity options.

Protocols

Depending on the product being serviced, various protocols are supported by the cRSP secured connection to the customer system:

Secured cRSP Server

Siemens' backend exclusively uses hardened systems designed for stability. Frequent updates ensure that actively developed distributions remain secure. According to the current state of the art, infections by worms, viruses, Trojan horses, and other attacks are highly unlikely. Additionally, Siemens' secured cRSP servers and encrypted databases comply with the latest security guidelines. The effectiveness of these protection measures is regularly audited (ISO/IEC 27001:2013), ensuring cRSP servers operate with state-of-the-art technology.

Quote

"The risks are manageable if the industry relies on a universal security concept."

— Dr. Rolf Reinema, Head of the IT Security Technology Field, Research and Development Department, Siemens, Corporate Technology (CT)

Appendix

IPsec

Siemens Owned Access

Connection between cRSP infrastructure and customer network is performed through a router provided by Siemens.

Diagram showing Siemens Owned Access via IPSec: Internet Connection -> VPN Broadband IPSec -> Access Point -> Customer Network. Ports UDP 500, 4500, TCP 22 are shown.

Customer Owned Access

Connection between cRSP infrastructure and customer network is performed through a customer router or it ends at the customer's firewall.

Diagram showing Customer Owned Access via IPSec: Internet Connection -> VPN Broadband IPSec -> Access Point -> Customer Network. Ports UDP 500, 4500, TCP 22 are shown.

Appendix (Continued)

SSL VPN

Internet Based Connection

Each equipment is connected to cRSP through the internet and utilizes a secure SSL VPN tunnel. Access to the internet is provided by the customer.

Diagram showing Internet Based Connection via SSL VPN: Internet Connection -> SSL VPN Tunnel -> Access Point -> Customer Network. Port TCP 443 is shown.

DigitalizationBox/Remote Solution Gateway

Connection between cRSP infrastructure and customer network is performed through a router provided by Siemens. Access to the internet is provided by the customer or over a mobile connection.

Diagram showing DigitalizationBox/Remote Solution Gateway connection via SSL VPN: Internet Connection -> SSL VPN Tunnel -> Access Point -> Customer Network. Port TCP 443 is shown.

General Statement

People spend about 90 percent of their time indoors. Improve the places where they spend their lives, and you improve their lives.

With Siemens' people, technology, products, and services, the aim is to create perfect places for every stage of life. When building technology creates perfect places – that's Ingenuity for life.

Creating environments that care.

Learn more at: siemens.com/smart-infrastructure

Article no. BT_0123_EN (Status 07/2019)

Subject to changes and errors. The information in this document contains only general descriptions and/or performance features which may not always specifically reflect those described, or which may undergo modification in the course of further product development. The requested performance features are binding only when expressly agreed upon in the concluded contract.

PDF preview unavailable. Download the PDF instead.

Download.aspx?pos=download&fct=getasset&id1=A6V11272775 Adobe InDesign 14.0 (Windows) Adobe PDF Library 15.0

Related Documents

Preview Siveillance Control Pro: Advanced Security Management for Critical Infrastructures
Siemens Siveillance Control Pro offers comprehensive security management for large, multi-site companies and critical infrastructures, unifying operations, enhancing incident response, and ensuring data security.
Preview Siemens Building X Security APIs Data Sheet
Data sheet for Siemens Building X Security APIs, detailing their functionality, subscription plans, and supported connected devices for managing identities, access privileges, and security events.
Preview Creating Safer, More Secure Campus Environments: Seven Keys to Smart Security Strategies
A guide to implementing smart strategies and technologies for enhancing campus security, focusing on seven key areas like risk assessment, perimeter security, access control, video surveillance, technology unification, communication, and system maintenance, by Dave Stolerow of Siemens.
Preview Siemens Cybersecurity: Protecting Industrial Operations and Solutions
Siemens details its comprehensive cybersecurity program, including expert teams, vulnerability management, industry standards compliance (IEC 62443, NERC CIP), and secure RuggedCOM solutions for critical infrastructure.
Preview Siemens S7-1200: Integrated Security Functions Guide
Discover the comprehensive integrated security features of the Siemens S7-1200 controller, including access protection, know-how protection, manipulation detection, and secure communication for industrial automation.
Preview Siemens NK8000 MP4.10 Product Release Notes | Network Gateways & Ethernet Ports
Siemens NK8000 MP4.10 Product Release Notes detailing new features, compatibility information, known issues, and documentation resources for NK8222, NK8223, and NK8225 Ethernet ports and BACnet gateways.
Preview Siemens FC72x / FT724 Fire Control Panel Operation Manual
This document provides comprehensive operational guidance for the Siemens FC72x and FT724 fire control panels and fire terminals. It covers system structure, PMI setup, and overall system functions, ensuring users can operate the system effectively during fire or fault events. The manual details button functions, display indications, operation modes, system functions, and troubleshooting.
Preview Secure Connection of RTU with CP 1243-7 LTE to TeleControl Server Basic
This document provides a detailed guide on establishing a secure connection between a Remote Terminal Unit (RTU) with S7-1200 and CP 1243-7 LTE to a TeleControl Server Basic using SINEMA Remote Connect. It covers hardware configuration, project engineering, VPN setup, and data point configuration for secure remote monitoring and control of industrial facilities.