Cybersecurity
Copyright © 2019 Eaton Corporation. All Rights Reserved.
IPN March 2019
133
Category
Description
Asset identification and
configuration
Keeping track of all the devices in the system is a pre-
requisite for effective management of Cybersecurity of a
system. Ensure you maintain an inventory of all of the
components in your system in a manner in which you
uniquely identify each component. To facilitate this, the
EFX48 provides the following identifying information -
manufacturer, type, serial number and firmware version
number.
For instructions on how to extract this information from the
unit please see page 81.
Restrict physical access
An attacker with unauthorized physical access could cause
serious disruption to a system or to device functionality.
Additionally, Industrial Control Protocols do not offer
cryptographic protections at protocol level leaving the
devices or systems relying on these protocols exposed to
Cybersecurity risk. Physical security is an important layer of
defense in such cases. EFX48 is designed with the
consideration that it would be deployed and operated in a
physically secure location. Following are some best practices
that Eaton recommends to ensure adequate security:
-
Restrict physical access to cabinets and/or
enclosures containing EFX48
and the associated
system. Monitor and log physical access at all times.
-
Physical access to any communication connections
should be restricted to prevent any attempts at
wiretapping or sabotage. It is best practice to use
metal conduits for the communication lines running
between one cabinet and another.
-
Utilize additional physical access restriction
mechanisms such as locks, card readers, and/or
guards etc. as appropriate.
-
Restrict physical access to the Ethernet connector.
-
EFX48 supports the following physical access port -
10/100baseT Ethernet via and RJ45 connector.
Physical access to this needs to be restricted.
-
Do not connect unauthorized portable devices (PCs,
laptops etc) for any operation (e.g. firmware
upgrade or configuration changes).
-
Eaton Cybersecurity Best Practices whitepaper provides
additional information about general physical security
considerations.
System access controls
Securely configure the logical access mechanisms provided
in EFX48 to safeguard the device from unauthorized access.
Eaton recommends proper use of the access controls
provided in the device to restrict system access only to
legitimate users. Also ensure that such users are restricted
only to privilege levels necessary to complete their job
roles/functions.
-
Ensure default credentials are changed upon first login.
A system containing an EFX48 should not be
commissioned with default credentials, as default
Summary of Contents for EFX48 e-Fuse Series
Page 9: ......
Page 50: ......
Page 54: ......
Page 88: ......
Page 157: ...Menu Map Copyright 2019 Eaton Corporation All Rights Reserved IPN March 2019 157...