BRDoc209
RoboBlot - User Manual [en-GB]
Rev: 2 | CRF: 2665
Bee Robotics Ltd
CONFIDENTIAL
Pg. 60 of 64
16.3
Appendix III - CYBER SECURITY STATEMENT
Network Security
1.
The INSTRUMENT supports the exchange of electronic data over a wired medium,
specifically over an Ethernet connection. The supported use case is that a laboratory
configured computer is connected to the instrument using CAT5-CAT7 Ethernet cables.
Validated software that implements the communication protocol will be installed on the
laboratory configured computer and exchange messages with the control software
installed within the INSTRUMENT.
2.
BEE ROBOTICS LTD. anticipates that laboratories have network technicians who configure
the buildings to only have specific internet access points. As such, it’s our recommendation
that the INSTRUMENT never be connected to the internet where it could potentially be
exposed to viruses – although no part of the INSTRUMENT operating system or control
software is configured to download anything from remote sources. Following this
recommendation, the INSTRUMENT does not therefore come with any pre-installed ANTI-
VIRUS software. It’s left up to the specific laboratory technicians to install their own
licensed software. It should be noted that it’s not recommended to connect the instrument
to an internet access point, as a local-area-connection (LAN) is the only expected use.
Since networks themselves can be a point of vulnerability to viruses, the INSTRUMENT
control software comes with a firewall implementation that should block the transfer of
rogue software over the network.
User Access Controls
1.
Access to an INSTRUMENT is first and foremost restricted behind access to a laboratory,
where it is standard practice to have restricted personnel policies. After this point, access
to the instrument software to be allowed to initiate a test is unrestricted.
2.
Specially trained service engineers are provided with passwords and knowledge on how to
access specialist tools that allow them to change the instrument configuration. These tools
typically involve calibration routines to ensure the instrument is running with optimum
performance.
3.
Customers are advised not allow the connection of additional input peripherals such as
keyboards and mice without from users other than service engineers.
Maintenance of Cyber Security
1.
The maintenance of cybersecurity is managed through software updates.
Updates to CONTROL SOFTWARE
When defects are found within the CONTROL SOFTWARE, Bee Robotics record them on an
internal tracking system with the intention of resolving in the next release. When a release
becomes available, Bee Robotics contact the customer with the update files and release
notes indicating the defects or flaws that were found, along with a severity rating for each
defect. After this point, it’s the client’s prerogative as to whether or not they apply the
updates.
Failure to comply can lead to the instrument being vulnerable to cyber-attacks and
unauthorised access.