Section 3
Cyber security
3.1
Cyber security definition
Cyber security aims to secure the properties of the organization against security risks.
To strengthen the system and increase the security level towards any cyber security
attacks from the Internet, certain actions are recommended while configuring the
device.
•
The device should be installed physically secure, for example, in a locked
cabinet.
•
The latest security updates need to be installed for all network devices.
•
The network inventory needs to be documented and kept up to date.
•
Unused services and interfaces should always be disabled.
•
Only VPN connections should be used to access remote networks.
3.2
Configuring firewall and services
Enable the firewall and disable the unused services and interfaces in the device. To
start, disallow traffic and allow only the needed traffic. Use the default policy to drop
connections.
•
Check that the firewall is enabled.
•
For incoming connections, always filter (drop) all unused ports which may
include DNS, L2TP-VPN, SNMP and so on.
•
Check that the default action is “drop” in firewalls and allow only the needed
ports.
•
Set unique passwords for each device.
•
Keep passwords stored in a safe place, for example, Encrypted password
management tool.
•
Check that all unused services are disabled.
•
If possible, allow IP connections only via VPN.
•
Disable all unused services, for example, Dial-in, SMSconfig, serial and SNMP.
•
Back up the configuration.
1MRS758861 A
Section 3
Cyber security
ARM600
15
User Manual