Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 213
•
•
•
•
•
•
•
•
•
•
5.2.2.3 Risk Assessment
Eaton recommends conducting a risk assessment to identify and assess reasonably foreseeable internal and external risks to the
confidentiality, availability and integrity of the system | device and its environment. This exercise should be conducted in
accordance with applicable technical and regulatory frameworks such as IEC 62443 and NERC-CIP. The risk assessment should be
repeated periodically.
5.2.2.4 Physical Security
An attacker with unauthorized physical access can cause serious disruption to system/device functionality. Additionally, Industrial
Control Protocols don’t offer cryptographic protections, making ICS and SCADA communications especially vulnerable to threats to
their confidentiality. Physical security is an important layer of defense in such cases. The Network module is designed to be
deployed and operated in a physically secure location. Following are some best practices that Eaton recommends to physically
secure your system/device:
Secure the facility and equipment rooms or closets with access control mechanisms such as locks, entry card readers,
guards, man traps, CCTV, etc. as appropriate.
Restrict physical access to cabinets and/or enclosures containing the Network module and the associated system. Monitor
and log the access at all times.
Physical access to the telecommunication lines and network cabling should be restricted to protect against attempts to
intercept or sabotage communications. It’s a best practice to use metal conduits for the network cabling running between
equipment cabinets.
The Network module supports the following physical access ports: RJ45, USB A, USB Micro-B. Access to these ports should
be restricted.
Do not connect removable media (e.g., USB devices, SD cards, etc.) for any operation (e.g., firmware upgrade, configuration
change, or boot application change) unless the origin of the media is known and trusted.
Before connecting any portable device through a USB port or SD card slot, scan the device for malware and viruses.
5.2.2.5 Account management
Logical access to the system | device should be restricted to legitimate users, who should be assigned only the privileges
necessary to complete their job roles/functions. Some of the following best practices may need to be implemented by
incorporating them into the organization’s written policies:
Ensure default credentials are changed upon first login Network module should not be deployed in production environments
with default credentials, as default credentials are publicly known.
No account sharing – Each user should be provisioned a unique account instead of sharing accounts and passwords. Security
monitoring/logging features in the product are designed based on each user having a unique account. Allowing users to
share credentials weakens security.
Restrict administrative privileges - Attackers seek to gain control of legitimate credentials, especially those for highly
privileged accounts. Administrative privileges should be assigned only to accounts specifically designated for administrative
duties and not for regular use.
Leverage the roles / access privileges
admin, operator, viewer to provide tiered access to the users as per the business /
operational need. Follow the principle of least privilege (allocate the minimum authority level and access to system resources
required for the role).
Summary of Contents for Network-M3
Page 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Page 2: ......
Page 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Page 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Page 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Page 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Page 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Page 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Page 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Page 287: ...Acronyms and abbreviations Information 287...
Page 294: ......