EasyManua.ls Logo

Eaton Network-M3 - Cybersecurity recommended secure hardening guidelines

Eaton Network-M3
294 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 211
5.2 Cybersecurity recommended secure hardening guidelines
Introduction
Secure configuration guidelines
Asset Management
Defense in Depth
Risk Assessment
Physical Security
Account management
Time Synchronization
Deactivate unused features
Network Security
Remote access
Logging and Event Management
Malware defenses
Secure Maintenance
Business Continuity / Cybersecurity Disaster Recovery
Sensitive Information Disclosure
Decommissioning or Zeroization
References
5.2.1 Introduction
This Network modulehas been designed with cybersecurity as an important consideration. Number of features are offered in the
product to address cybersecurity risks. These Cybersecurity Recommendations provide information to help users to deploy and
maintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity Recommendations are not intended
to provide a comprehensive guide to cybersecurity, but rather to complement customers’ existing cybersecurity programs.
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products
and solutions, making them more secure, reliable and competitive for customers.
The following whitepapers are available for more information on general cybersecurity best practices and guidelines:
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):http://www.eaton.com/ecm/groups/public/@pub/
@eaton/@corp/documents/content/pct_1603172.pdf
Cybersecurity Best Practices Checklist Reminder (WP910003EN):http://www.cooperindustries.com/content/dam/public/
powersystems/resources/library/1100_EAS/WP910003EN.pdf
Cybersecurity Best Practices for Modern Vehicles - NHTSA:https://www.nhtsa.gov/staticfiles/nvs/pdf/
812333_CybersecurityForModernVehicles.pdf
5.2.2 Secure configuration guidelines
5.2.2.1 Asset Management
Keeping track of software and hardware assets in your environment is a pre-requisite for effectively managing cybersecurity. Eaton
recommends that you maintain an asset inventory that uniquely identifies each important component.
To facilitate this, Network modulesupports the following identifying information:
5.2.2.1.1 Network Module identification and its firmware information
It can be retrieved by navigating to
Card>>>System information or Maintenance>>>System information
.
Identification
System name
Product
Physical name
Vendor
UUID
Part number

Table of Contents

Related product manuals