GE IPC2018 Скачать руководство пользователя страница 6

Notes

6

GFK-3015

IPC2018 IPC Secure Deployment Guide

For public disclosure

Содержание IPC2018

Страница 1: ...GFK 3015 IPC2018 Industrial PC IPC Secure Deployment Guide June 2017 For public disclosure ...

Страница 2: ...rnishing of this document does not provide any license whatsoever to any of these patents Public This document is approved for public disclosure GE provides the following document and the information included therein as is and without warranty of any kind expressed or implied including but not limited to any implied statutory warranty of merchantability or fitness for particular purpose For furthe...

Страница 3: ...rsonal injury or death Caution Indicates a procedure or condition that if not strictly observed could result in damage to or destruction of equipment Attention Indicates a procedure or condition that should be strictly followed to improve these applications GFK 3015 Secure Deployment Guide 3 For public disclosure ...

Страница 4: ... of support English Europe not Germany Middle East and Africa EMEA Phone 800 1 433 2682 EMEA Direct Dial 420 23 901 5850 if toll free 800 option is unavailable or dialing from a mobile telephone Technical Support Email support emea ip ge com Customer Care Email customercare emea ip ge com Primary languages of support English French Italian Czech Spanish Germany Phone 49 821 5034 170 Technical Supp...

Страница 5: ...tform Configuration and Hardening 11 4 Network Architecture and Secure Deployment 13 4 1 Reference Architecture 13 4 2 Demilitarized Zones DMZ 13 5 Other Considerations 15 5 1 Anti virus software 15 5 2 Data Execution Prevention DEP 15 5 3 Patching 15 5 3 1 Patching GE Proficy Software 15 5 3 2 Patching third party Software 15 5 4 Additional Guidance 16 5 4 1 Protocol specific Guidance 16 5 4 2 Go...

Страница 6: ...Notes 6 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 7: ...ion RXi2 EPxxxxxxxxxx IPC2018 with bC6L17 R2Xxxxxxxxxxx IPC2018 with bC6L18 Caution The controllers and supervisory level computers covered in this document were not designed for or intended to be connected directly to any wide area network including but not limited to a corporate network or the Internet at large Additional routers and firewalls such as supplied with the NetworkST 4 0 option that ...

Страница 8: ...Notes 8 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 9: ...ploit vulnerabilities in each layer of defense that protects an asset For example if a system is protected because it is on a network protected by a firewall the attacker only needs to circumvent the firewall to gain unauthorized access However if there is an additional layer of defense say a username password authentication requirement now the attacker needs to find a way to circumvent both the f...

Страница 10: ...Secure Deployment 5 Configure firewalls and other network security devices 6 Enable and or configure the appropriate security features on each module 7 For each module change every supported password to something other than its default value 8 Harden the configuration of each module disabling unneeded features protocols and ports 9 Test qualify the system 10 Create an update maintenance plan Note ...

Страница 11: ...with vendor recommendations or industry standards The following organizations publish best practices checklists benchmarks and other resources for securing systems System Security Resources Organization Website Center for Internet Security CIS http www cisecurity org National Institute of Standards and Technology NIST http checklists nist gov Microsoft http technet microsoft com security default a...

Страница 12: ...Notes 12 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 13: ...cations are authenticated and exposed in a limited fashion using web based applications and reporting capabilities 0 1 Network Architecture 4 2 Demilitarized Zones DMZ A DMZ architecture uses two firewalls to isolate servers that are accessible from untrusted networks Never expose an iFIX SCADA node directly to the internet Instead place a relay server or WebSpace in a DMZ configuration For additi...

Страница 14: ...Notes 14 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...

Страница 15: ...ed protection against the exploitation of application security vulnerabilities such as buffer overflows In the event there is a Proficy product defect discovered while running DEP GE will make all reasonable efforts to provide a solution 5 3 Patching 5 3 1 Patching GE Proficy Software GE recommends that customers keep Proficy software up to date by applying the latest Software Improvement Module S...

Страница 16: ... including how to securely deploy and use Control Systems For example the U S Department of Homeland Security has published guidance on Secure Architecture Design and on Recommended Practices for cyber security with Control Systems Such documentation when appropriate should be considered in addition to this document Similarly the International Society of Automation publishes the ISA 99 specificati...

Страница 17: ......

Страница 18: ...Automation Controls 1 800 433 2682 1 434 978 5100 www geautomation com GFK 3015 For public disclosure ...

Отзывы: