Security area Device security capabilities
Role in defense-in-
depth
Device configuration
•
Internal time synchronization.
•
Time source integrity protection and
meter configuration event logging.
•
Timestamps, including date and time,
match the meter clock.
•
The device embeds user information
when a change is made.
•
SSH server hosts an internal SFTP
site and stores files in the meter’s
flash memory, such as webpages,
COMTRADE records, and firmware
files.
•
Settings can be saved as a Security
Configuration File (.scf) using ION
Setup.
•
Offload information to syslog or a
protected storage or retention
location.
These capabilities
support the analysis of
security and user
account events and help
protect the device from
unauthorized alteration
and record configuration
changes.
Device hardening
•
Least functionality.
•
Default port numbers can be changed
to lower the predictability of port use.
•
Unused protocols can be disabled to
reduce the attack surface of the
device.
•
Inactivity timeout requires sign in after
a time-period of inactivity for
webpages, display, and Secure ION
protocol.
•
Limit the number of consecutive failed
login attempts.
These capabilities help
prohibit and restrict the
use of unnecessary
functions, ports,
protocols, and services.
9810 series - User manual Cybersecurity
7EN05-0390-08 30