Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 200
•
•
•
•
•
•
•
•
•
•
•
•
Deploy adequate network protection devices like Firewalls, Intrusion Detection / Protection devices,
Please find detailed information about various Network level protection strategies in Eaton Cybersecurity Considerations for
Electrical Distribution Systems [R1]. Use the below information for configuring the firewalls to allow needed access for Network
module to operate smoothly.
Navigate to
Information>>>Specifications/Technical characteristics
to get the list of all ports and services running on the device.
SNMP V1/SNMP V3 can be disabled or configured by navigating to
Contextual help>>>Settings>>>SNMP
.
Instructions are available in the
Contextual help>>>Settings>>>SNMP
.
5.2.2.5
Logging and Event Management
Best Practices
Eaton recommends that all remote interactive sessions are encrypted, logged, and monitored including all administrative and
maintenance activities.
Ensure that logs are backed up, retain the backups for a minimum of 3 months or as per organization’s security policy.
Perform log review at a minimum every 15 days.
Navigate to
Information>>>List of events codes
to get log information and how to export it.
5.2.2.6
Secure Maintenance
Best Practices
5.2.2.6.1 Apply Firmware updates and patches regularly
Due to increasing Cyber Attacks on Industrial Control Systems, Eaton implements a comprehensive patch and update process for
its products. Users are encouraged to maintain a consistent process to promptly monitor for fresh firmware updates, implement
patching and updates as and when required or released.
Navigate in the help to
Contextual help>>>Maintenance>>>Services
to get information on how to upgrade the Network Module.
Eaton also has a robust vulnerability response process. In the event of any security vulnerability getting discovered in its
products, Eaton patches the vulnerability and releases information bulletin through its cybersecurity web site -
and patch through www.eaton.com/downloads.
Conduct regular Cybersecurity risk analyses of the organization /system.
Eaton has worked with third-party security firms to perform system audits, both as part of a specific customer’s deployment and
within Eaton’s own development cycle process. Eaton can provide guidance and support to your organization’s effort to perform
regular cybersecurity audits or assessments.
5.2.2.6.2 Plan for Business Continuity / Cybersecurity Disaster Recovery
It’s a Cybersecurity best practice for organizations to plan for Business continuity. Establish an OT Business Continuity plan,
periodically review and, where possible, exercise the established continuity plans. Make sure offsite backups include
Backup of the latest f/w copy of Network module. Make it a part of SOP to update the backup copy as soon as the latest f/w
is updated on Network module.
Backup of the most current configurations.
Documentation of the most current User List.
Save and store securely the current configurations of the device.
5.2.3
References
[R1]
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdf
[R2]
Cybersecurity Best Practices Checklist Reminder (WP910003EN):
Содержание Network-M2
Страница 1: ...UPS Network Management Card Network M2 User s Guide English 10 15 2020 2 0 5 ...
Страница 2: ......
Страница 24: ...Configuring Modbus Installing the Network Management Module 24 ...
Страница 25: ...Configuring Modbus Installing the Network Management Module 25 ...
Страница 26: ...Configuring Modbus Installing the Network Management Module 26 ...
Страница 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Страница 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...
Страница 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...
Страница 43: ...Home Contextual help of the web interface 43 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode ...
Страница 64: ...Protection Contextual help of the web interface 64 Example 2 Immediate OFF Example 4 Custom ...
Страница 65: ...Protection Contextual help of the web interface 65 Settings 1 ...
Страница 261: ...Acronyms and abbreviations Information 261 ...
Страница 268: ......