Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 211
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
5.2 Cybersecurity recommended secure hardening guidelines
Introduction
Secure configuration guidelines
Asset Management
Defense in Depth
Risk Assessment
Physical Security
Account management
Time Synchronization
Deactivate unused features
Network Security
Remote access
Logging and Event Management
Malware defenses
Secure Maintenance
Business Continuity / Cybersecurity Disaster Recovery
Sensitive Information Disclosure
Decommissioning or Zeroization
5.2.1 Introduction
This Network module has been designed with cybersecurity as an important consideration. Number of features are offered in the
product to address cybersecurity risks. These Cybersecurity Recommendations provide information to help users to deploy and
maintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity Recommendations are not intended
to provide a comprehensive guide to cybersecurity, but rather to complement customers’ existing cybersecurity programs.
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products
and solutions, making them more secure, reliable and competitive for customers.
The following whitepapers are available for more information on general cybersecurity best practices and guidelines:
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/
@eaton/@corp/documents/content/pct_1603172.pdf
http://www.cooperindustries.com/content/dam/public/
powersystems/resources/library/1100_EAS/WP910003EN.pdf
https://www.nhtsa.gov/staticfiles/nvs/pdf/
812333_CybersecurityForModernVehicles.pdf
5.2.2 Secure configuration guidelines
5.2.2.1 Asset Management
Keeping track of software and hardware assets in your environment is a pre-requisite for effectively managing cybersecurity. Eaton
recommends that you maintain an asset inventory that uniquely identifies each important component.
To facilitate this, Network module supports the following identifying information:
5.2.2.1.1 Network Module identification and its firmware information
It can be retrieved by navigating to
Card>>>System information or Maintenance>>>System information.
Identification
System name
Product
Physical name
Vendor
UUID
Part number
Содержание Network-M3
Страница 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Страница 2: ......
Страница 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Страница 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Страница 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Страница 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Страница 37: ...Home Contextual help of the web interface 37 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode...
Страница 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Страница 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Страница 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Страница 287: ...Acronyms and abbreviations Information 287...
Страница 294: ......