11 Appendix A: Recommended secure hardening
guidelines
The UPS has been designed with cybersecurity as an important consideration.
Number of cybersecurity features are now offered in the product which, if
implemented as per the recommendations in this section, would minimize the
cybersecurity risk to the UPS. The “secure configuration” or “hardening”
guidelines provide information to the users to securely deploy and maintain their
product to adequately minimize the cybersecurity risks to their system.
Our company is committed to minimizing the cybersecurity risk in its products
and deploys cybersecurity best practices and latest cybersecurity technologies
in its products and solutions, making them more secure, reliable and competitive
for our customers. Our company also offers Cybersecurity Best Practices
whitepapers to its customers that can be referenced at www.eaton.com/
cybersecurity.
Table 28: Secure configuration guidelines
Category
Description
Asset identification and in-
ventory
Keeping track of all the devices in the system is a pre-
requisite for effective management of cybersecurity of a
system. Make sure that you maintain an inventory of all
the components in your system in a manner in which you
uniquely identify each component. To facilitate this, the
UPS supports the following identifying information: manu-
facturer, type, serial number, f/w version number, and lo-
cation.
Users can extract device information at locations men-
tioned below:
•
Product number, serial number and UPS name are lis-
ted on the Information screen
•
Firmware versions can be found on the About screen
Eaton 93E Generation 2 UPS 100-200 kVA
(380/400/415V)
User's and installation guide
©
Eaton Corporation plc 2019. All rights reserved.
Revision: 002
Document ID: P-164000848
113 (118)