GE IPC2018 Скачать руководство пользователя страница 15

5

Other Considerations

This chapter provides additional recommendations and frequently asked questions (FAQ).

5.1

Anti-virus software

GE encourages customers to use third-party anti-virus (AV) software of their choice and to keep it up-to-date with the latest
updates.

While GE does not specifically certify any particular anti-virus supplier’s software, we do test our products with GE’s
corporate standard (currently Sophos Antivirus) installed and running on all test and system lab machines. In the event there
is a Proficy product defect discovered while running any anti-virus software, GE will make all reasonable efforts to provide a
solution. However, if the issue is found to be based on specific behavior of the AV software, the customer might be advised to
work with the AV software vendor and/or switch to another AV software vendor to get resolution to their issue.

5.2

Data Execution Prevention (DEP)

GE products function with Microsoft Windows Data Execution Prevention (DEP) enabled and GE recommends that
customers enable this feature as an added protection against the exploitation of application security vulnerabilities such as
buffer overflows.

In the event there is a Proficy product defect discovered while running DEP, GE will make all reasonable efforts to provide a
solution.

5.3

Patching

5.3.1

Patching GE Proficy Software

GE recommends that customers keep Proficy software up-to-date by applying the latest Software Improvement Module (SIM)
to their deployed Proficy products. SIMs add new functionality, fix bugs, and address security vulnerabilities.

Security advisories and security-related SIMs can be found on the GE Support website at

http://www.geautomation.com/security

.

Customers can also sign up for notification of new SIMs and security advisories on the website.

5.3.2

Patching third-party Software

GE recommends that customers keep operating systems, databases, and other third-party software in their environment
up-to-date with the latest security patches from the software vendor.

GE regularly validates the compatibility of selected GE products with third-party operating system security patches. For more
information on this process, refer to GE Support website at

http://www.geautomation.com/security

.

Other Considerations

GFK-3015 Secure Deployment Guide 15

For public disclosure

Содержание IPC2018

Страница 1: ...GFK 3015 IPC2018 Industrial PC IPC Secure Deployment Guide June 2017 For public disclosure ...

Страница 2: ...rnishing of this document does not provide any license whatsoever to any of these patents Public This document is approved for public disclosure GE provides the following document and the information included therein as is and without warranty of any kind expressed or implied including but not limited to any implied statutory warranty of merchantability or fitness for particular purpose For furthe...

Страница 3: ...rsonal injury or death Caution Indicates a procedure or condition that if not strictly observed could result in damage to or destruction of equipment Attention Indicates a procedure or condition that should be strictly followed to improve these applications GFK 3015 Secure Deployment Guide 3 For public disclosure ...

Страница 4: ... of support English Europe not Germany Middle East and Africa EMEA Phone 800 1 433 2682 EMEA Direct Dial 420 23 901 5850 if toll free 800 option is unavailable or dialing from a mobile telephone Technical Support Email support emea ip ge com Customer Care Email customercare emea ip ge com Primary languages of support English French Italian Czech Spanish Germany Phone 49 821 5034 170 Technical Supp...

Страница 5: ...tform Configuration and Hardening 11 4 Network Architecture and Secure Deployment 13 4 1 Reference Architecture 13 4 2 Demilitarized Zones DMZ 13 5 Other Considerations 15 5 1 Anti virus software 15 5 2 Data Execution Prevention DEP 15 5 3 Patching 15 5 3 1 Patching GE Proficy Software 15 5 3 2 Patching third party Software 15 5 4 Additional Guidance 16 5 4 1 Protocol specific Guidance 16 5 4 2 Go...

Страница 6: ...Notes 6 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 7: ...ion RXi2 EPxxxxxxxxxx IPC2018 with bC6L17 R2Xxxxxxxxxxx IPC2018 with bC6L18 Caution The controllers and supervisory level computers covered in this document were not designed for or intended to be connected directly to any wide area network including but not limited to a corporate network or the Internet at large Additional routers and firewalls such as supplied with the NetworkST 4 0 option that ...

Страница 8: ...Notes 8 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 9: ...ploit vulnerabilities in each layer of defense that protects an asset For example if a system is protected because it is on a network protected by a firewall the attacker only needs to circumvent the firewall to gain unauthorized access However if there is an additional layer of defense say a username password authentication requirement now the attacker needs to find a way to circumvent both the f...

Страница 10: ...Secure Deployment 5 Configure firewalls and other network security devices 6 Enable and or configure the appropriate security features on each module 7 For each module change every supported password to something other than its default value 8 Harden the configuration of each module disabling unneeded features protocols and ports 9 Test qualify the system 10 Create an update maintenance plan Note ...

Страница 11: ...with vendor recommendations or industry standards The following organizations publish best practices checklists benchmarks and other resources for securing systems System Security Resources Organization Website Center for Internet Security CIS http www cisecurity org National Institute of Standards and Technology NIST http checklists nist gov Microsoft http technet microsoft com security default a...

Страница 12: ...Notes 12 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 13: ...cations are authenticated and exposed in a limited fashion using web based applications and reporting capabilities 0 1 Network Architecture 4 2 Demilitarized Zones DMZ A DMZ architecture uses two firewalls to isolate servers that are accessible from untrusted networks Never expose an iFIX SCADA node directly to the internet Instead place a relay server or WebSpace in a DMZ configuration For additi...

Страница 14: ...Notes 14 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 15: ...ed protection against the exploitation of application security vulnerabilities such as buffer overflows In the event there is a Proficy product defect discovered while running DEP GE will make all reasonable efforts to provide a solution 5 3 Patching 5 3 1 Patching GE Proficy Software GE recommends that customers keep Proficy software up to date by applying the latest Software Improvement Module S...

Страница 16: ... including how to securely deploy and use Control Systems For example the U S Department of Homeland Security has published guidance on Secure Architecture Design and on Recommended Practices for cyber security with Control Systems Such documentation when appropriate should be considered in addition to this document Similarly the International Society of Automation publishes the ISA 99 specificati...

Страница 17: ......

Страница 18: ...Automation Controls 1 800 433 2682 1 434 978 5100 www geautomation com GFK 3015 For public disclosure ...

Отзывы: