EasyManua.ls Logo

Eaton Network-M2 - Configuring User Permissions through Profiles; Decommissioning the Network Management Module

Eaton Network-M2
268 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring user permissions through profiles
Securing the Network Management Module – 201
[R3]
NIST SP 800-82 Rev 2, Guide to Industrial Control Systems (ICS) Security, May 2015:
https://ics-cert.us-cert.gov/Standards-and-References
[R4] National Institute of Technology (NIST) Interagency “Guidelines on Firewalls and Firewall Policy, NIST Special Publication
800-41”, October 2009:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf
5.3 Configuring user permissions through profiles
The user profile can be defined when creating a new users or changed when modifying an existing one.
Refer to the sectionContextual help>>>Settings>>>Local usersin the settings.
5.4 Decommissioning the Network Management module
With the increased frequency of reported data breaches, it’s becoming more and more necessary for companies to implement
effective and reliable decommissioning policies and procedures.
In order to protect the data stored on retired IT equipment from falling into the wrong hands, or a data breach, we recommend to
follow below decommissioning steps:
1- Sanitize the Network Module
Sanitizationerases all the data (user name and password, certificates, keys, settings, logs...).
To sanitize the Network Module refer to theContextual help>>>Maintenance>>>Services>>>Sanitization section.
2- Unmount the Network Module from the device.
Unscrew the Network Module and remove it from the slot.

Table of Contents

Related product manuals