
1
51
Security Con
siderations
Security control recommendations are provided hereby
to avoid
unauthorized
external
access
that may
result in the following:
•
Loss of system availability
.
•
Incorrect execution of controls causing damage to the plant, or theft or contamination of
the
product
.
•
The capture, modification or deletion
and loss
of data
.
•
Device Isolation:
o
Isolated Solution
Restrict physical access to the device and other network devices in the network.
The device must be physically protected in locked cabinets, and logically protected with
passwords to prevent tampering.
Isolate the device from the other computer networks.
o
Control Room Isolation
Isolate devices to the process control network, following best practices.
Logically segment process control system networks into multiple segments (such as
control network, supervisory network, non-control system network, business network).
o
Provide Remote Access/Isolation
Use VPN and Business Firewall to prohibit or restrict unnecessary network traffic into
control system networks from non-control system network and vice versa.
•
MDM Communication
o
Secure the communication between the device/cellular network and the remote MDM host,
over a private VPN IPsec tunnel.
o
Use a firewall and secure the local area network connecting VPN Gateway and server
hosting MDM/host application.
•
Key Management Recommendation
o
Avoid using default and common credentials.
o
The user is strongly advised to change the default password for device access during
installation. Also, the user is strongly advised to periodically change the password of the
device as per respective organization policies.
o
Follow standards and / or best practices for key management (e.g.: NIST, ISO)
o
Take steps to
implement and enforce physical security of devices in network
o
Apply Zone Protection profiles
to provide
protect
ion against
entire zones from flood attacks
and DoS
protection
. This
provides granular defense for specific systems, especially
critical
systems that
users access from the internet and often attack targets, such as web
servers and
database
servers. Apply both types of protection.
o
Logically and physically isolate control system networks from non-control system networks.
T
he network devices (e.g. switches, routers, firewalls) along with necessary access control
and
routing policy can be used to logically isolate, prioritize the different network segment
and/or
application traffic.
Caution:
The caution warns you of possible damage to property and provides instructions to
avoid damage to Mini-AT.
Security Control
Recommendations
:
Summary of Contents for Mini-AT
Page 2: ...2 www honeywell com ...
Page 138: ...138 www honeywell com Mini AT User Guide Mini AT Door ...
Page 140: ...140 www honeywell com Mini AT User Guide Meter Mount Mini AT ...
Page 142: ...142 www honeywell com Mini AT User Guide Wall Mount Mini AT ...
Page 144: ...144 www honeywell com Page 144 Mini AT User Guide ...
Page 145: ...145 Page 145 Mini AT User Guide ...
Page 146: ...146 www honeywell com Page 146 Mini AT User Guide ...
Page 147: ...147 Page 147 Mini AT User Guide ...
Page 148: ...148 www honeywell com Page 148 Mini AT User Guide ...
Page 149: ...149 Page 149 Mini AT User Guide ...
Page 150: ...150 www honeywell com Page 150 Mini AT User Guide ...