2 Safety instructions
EN
6
Rittal enclosure cooling unit
Such protection can be achieved only with organisation-
al and technical measures. To satisfy the increased safe-
ty requirements, Rittal recommends the observance of
the following measures. Furthermore, more detailed in-
formation can be found on the websites of Bundesamt
für Sicherheit in der Informationstechnik (Federal Office
for IT Security – BSI).
2.9.1
Measures for products and systems
Embed products and systems not in public net-
works.
Make sure that the system is only operated in protect-
ed networks.
Configure the firewall
To protect your networks, and the embedded prod-
ucts and systems against external effects, configure a
firewall.
Also deploy a firewall for segmentation of a network or
to isolate a controller.
Consider defence-in-depth mechanisms during
the planning phase
Consider defence-in-depth mechanisms for your sys-
tem planning.
Defence-in-depth mechanisms cover several levels of
mutually coordinated security measures.
Restrict access authorisations
Restrict access authorisations to networks and sys-
tems to only persons that need an authorisation.
Protect accesses
Do not use the default passwords; instead, use se-
cure, long passwords containing numbers, a mix of
upper case and lower case letters, symbols and no
repetitions.
Create random passwords with a password manager.
Deploy the current firmware version
Ensure that the current Rittal firmware is deployed on
all devices.
The firmware can be downloaded from the associated
product pages in the Internet.
Observe the associated Release Notes for new firm-
ware versions.
Deploy current security software
To identify and eliminate security threats, such as vi-
ruses, trojans and other malicious software, security
software should be installed on all PCs and kept up-
to-date.
Deploy whitelist tools to monitor the device context.
Deploy an intrusion-detection system to validate the
communication of your system.
Perform regular threat analyses
Rittal recommends that you perform regular threat
analyses.
The threat analyses allow you to determine whether
your adopted measures are effective.
Protect USB ports against access
USB ports must be protected against physical access.
Ensure that no unauthorised persons have access to
USB ports.
Sensitive data can be read for an unauthorised access
to USB ports.