![MR ETOS IM Operating Instructions Manual Download Page 21](http://html.mh-extra.com/html/mr/etos-im/etos-im_operating-instructions-manual_1844393021.webp)
3 IT security
Maschinenfabrik Reinhausen GmbH 2019
21
5163667/06 EN
ETOS
®
IM
3 IT security
Observe the following recommendations for secure operation of the product.
General
▪ Ensure that only authorized personnel have access to the device.
▪ Only use the device within an ESP (electronic security perimeter). Do not
connect the device to the Internet in an unprotected state. Use mecha-
nisms for vertical and horizontal network segmenting and security gate-
ways (firewalls) at the transition points.
▪ Ensure that the device is only operated by trained personnel who are fa-
miliar with IT security.
Commissioning
Observe the following recommendations for device commissioning:
▪ User IDs must be unique and assignable. Do not use a "Group account"
function or the "Auto login" function.
▪ Activate the "Auto logout [
Section 7.2.8, Page 97]" function.
▪ Restrict the rights of the individual user groups as much as is feasible; this
helps avoid errors during operative actions. A user with the "Operator"
role, for example, should only perform operative actions and should not be
able to change any device settings.
▪ Delete or disable the default "admin" user ID. This requires first creating a
new user account with the "Administrator" role. You can then use it to
delete or disable the default "admin" account.
▪ Enable SSL/TLS encryption [
Section 7.2, Page 94]; access to the de-
vice is then only possible using the SSL/TLS protocol. In addition to en-
crypting communication, this protocol also checks the authenticity of the
server.
▪ Use TLS version 1.2 or higher wherever possible.
▪ Integrate the device into a public key infrastructure. Create your own SSL
certificate for this if necessary and then import it.
▪ Connect the device to a central log server by using the syslog interface
Operation
Observe the following recommendations during device operation:
▪ Change the password at regular intervals.
Section 7.28.1, Page 306] at regular intervals.
▪ Check the log files regularly for unauthorized system access and other se-
curity-related events.
Interfaces
The device uses the following interfaces for communication:
Summary of Contents for ETOS IM
Page 1: ...Monitoring system ETOS IM Operating instructions 5163667 06 EN ...
Page 410: ......
Page 411: ......