32
INM 9475-ETG Rev 1
Category
Description
Remote Access
Remote access to devices/systems creates another
entry point into the network. Strict management
and validation of termination of such access is vital
for maintaining control over overall ICS security. The
9475 Gigabit Media Converter requires additional
hardware to allow Remote Access. This hardware
will need securing correctly to ensure security
Logging and
Event
Management
•
Eaton recommends logging all relevant
system and application events, including all
administrative and maintenance activities.
•
Logs should be protected from tampering and
other risks to their integrity (for example, by
restricting permissions to access and modify
logs, transmitting logs to a security information
and event management system, etc.).
•
Ensure that logs are retained for a reasonable
and appropriate length of time.
•
Review the logs regularly. The frequency
of review should be reasonable, taking into
account the sensitivity and criticality of the
system | device and any data it processes.
Vulnerability Scanning
Any known critical or high severity vulnerabilities
on third party component/libraries used to run
software /applications should be remediated
before putting the device | system into production.
•
Eaton recommends running a vulnerability
scan to identify known vulnerabilities for
software used with the product. For COTS
components (e.g., applications running on
Windows), vulnerabilities can be tracked on
the National Vulnerability Database (NVD),
available at https://nvd.nist.gov/.
•
Keep software updated by monitoring security
patches made available by COTS vendors and
installing them as soon as possible.
Note: Many compliance frameworks and security
best practices require a monthly vulnerability
review. For many non-COTS products vulnerabilities
will be communicated directly through the vendor
site.
Malware Defenses
Eaton recommends deploying adequate malware
defenses to protect the product or the platforms
used to run the Eaton product.