CONTENTS
Touchpoint Pro
Pt. No. 2400M2567_1 4 Security Guide
1 Contents
1 Contents ........................................................................................................................................... 4
2 Introduction ..................................................................................................................................... 5
2.1 Scope .................................................................................................................................. 5
2.2 Assumptions and pre-requisites .......................................................................................... 5
2.3 Related documents ............................................................................................................. 5
2.4 Security Controls ................................................................................................................. 5
2.4.1 Additional User Controls ................................................................................................ 5
2.4.2 Further Information ........................................................................................................ 5
3 IT System Architecture ................................................................................................................... 6
3.1 Ethernet Remote Connections ............................................................................................ 6
3.2 Physical and Local connections .......................................................................................... 6
4 Threats ............................................................................................................................................. 7
4.1 Unauthorised access .......................................................................................................... 7
4.2 Communications snooping .................................................................................................. 7
4.3 Viruses and other malicious software agents ...................................................................... 7
5 Mitigation Strategies ....................................................................................................................... 8
5.1 Touchpoint Pro System ....................................................................................................... 8
5.1.1 Monitor System Access ................................................................................................. 8
5.1.2 User Access and Passwords ......................................................................................... 8
5.1.3 Software and Unusual Operation ................................................................................... 9
5.1.4 Memory Media ............................................................................................................... 9
5.1.5 Configuration Port .......................................................................................................... 9
5.1.6 Software and Firmware Updates ................................................................................... 9
5.2 Computers and Access ....................................................................................................... 9
5.2.1 Operating Software ........................................................................................................ 9
5.2.2 Virus Protection ............................................................................................................. 9
5.2.3 Files and Media ............................................................................................................. 9
5.2.4 User Access and Passwords ....................................................................................... 10
5.3 Networks, Firewalls & VPN connections ........................................................................... 10
5.3.1 Physical Access ........................................................................................................... 10
5.3.2 Firewall and DMZ ......................................................................................................... 10
5.3.3 Internet and VPN ......................................................................................................... 10
6 Glossary ......................................................................................................................................... 11
6.1 Abbreviations .................................................................................................................... 11