Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 211
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
5.2 Cybersecurity recommended secure hardening guidelines
Introduction
Secure configuration guidelines
Asset Management
Defense in Depth
Risk Assessment
Physical Security
Account management
Time Synchronization
Deactivate unused features
Network Security
Remote access
Logging and Event Management
Malware defenses
Secure Maintenance
Business Continuity / Cybersecurity Disaster Recovery
Sensitive Information Disclosure
Decommissioning or Zeroization
5.2.1 Introduction
This Network module has been designed with cybersecurity as an important consideration. Number of features are offered in the
product to address cybersecurity risks. These Cybersecurity Recommendations provide information to help users to deploy and
maintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity Recommendations are not intended
to provide a comprehensive guide to cybersecurity, but rather to complement customers’ existing cybersecurity programs.
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products
and solutions, making them more secure, reliable and competitive for customers.
The following whitepapers are available for more information on general cybersecurity best practices and guidelines:
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/
@eaton/@corp/documents/content/pct_1603172.pdf
http://www.cooperindustries.com/content/dam/public/
powersystems/resources/library/1100_EAS/WP910003EN.pdf
https://www.nhtsa.gov/staticfiles/nvs/pdf/
812333_CybersecurityForModernVehicles.pdf
5.2.2 Secure configuration guidelines
5.2.2.1 Asset Management
Keeping track of software and hardware assets in your environment is a pre-requisite for effectively managing cybersecurity. Eaton
recommends that you maintain an asset inventory that uniquely identifies each important component.
To facilitate this, Network module supports the following identifying information:
5.2.2.1.1 Network Module identification and its firmware information
It can be retrieved by navigating to
Card>>>System information or Maintenance>>>System information.
Identification
System name
Product
Physical name
Vendor
UUID
Part number
Summary of Contents for Network-M3
Page 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Page 2: ......
Page 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Page 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Page 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Page 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Page 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Page 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Page 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Page 287: ...Acronyms and abbreviations Information 287...
Page 294: ......