31
INM 9476-ETG Rev 2
Category
Description
Asset Management
Keeping track of software and hardware assets in
your environment is a pre-requisite for effectively
managing cybersecurity. Eaton recommends that
you maintain an asset inventory that uniquely
identifies each important component. To facilitate
this, The 9476 Gigabit Switch supports the
following identifying information:
<Include for hardware> - manufacturer, type, serial
number, f/w version number, and location.
<Include for software> - publisher, name, version,
and version date.
Risk Assessment
Eaton recommends conducting a risk assessment
to identify and assess reasonably foreseeable
internal and external risks to the confidentiality,
availability and integrity of the system | device
and its environment. This exercise should be
conducted in accordance with applicable technical
and regulatory frameworks such as IEC 62443
and NERC-CIP. The risk assessment should be
repeated periodically.
Physical Security
An attacker with unauthorized physical access can
cause serious disruption to device functionality.
Additionally, Industrial Control Protocols don’t offer
cryptographic protections, making ICS and SCADA
communications especially vulnerable to threats
to their confidentiality. Physical security is an
important layer of defence in such cases The 9476
Gigabit Switch is designed to be deployed and
operated in a physically secure location. Following
are some best practices that Eaton recommends
to physically secure your device:
•
Secure the facility and equipment rooms or
closets with access control mechanisms such
as
•
locks, entry card readers, guards, man traps,
CCTV, etc. as appropriate.
•
Restrict physical access to cabinets and/
or enclosures containing The 9476 Gigabit
Switch and the associated system. Monitor
and log the access at all times.
•
Physical access to the telecommunication
lines and network cabling should be restricted
to protect against attempts to intercept or
sabotage communications
•
The 9476 Gigabit Switch supports the
following physical access ports.
•
RJ45
Access to these ports should be restricted.