![Xylem GOULDS e-AB Series Скачать руководство пользователя страница 52](http://html1.mh-extra.com/html/xylem/goulds-e-ab-series/goulds-e-ab-series_instruction-manual_4184747052.webp)
10 Cybersecurity
Defending against cybersecurity threats requires partnership and shared responsibility.
Xylem’s responsibility is to build products that include security features by design. The
customer has a responsibility to understand the risks inherent in the processes and take
steps to operate and maintain their solutions securely. This section gives an overview of
existing security features and guidance that will help securely operate Optimyze.
10.1 Xylem Product Cybersecurity
Xylem performs appropriate due care in building security into products and solutions from
design through end of life. For more information on Xylem cybersecurity practices or to
contact the cybersecurity team please visit
• Based on the level of risk, product security experts perform threat modeling to
recommend a testable controls baseline that impacts the requirements and design.
• During all product development and implementation, the code is scanned for flaws with
static analysis tools to identify common security errors and the product components are
analyzed to understand dependencies and identify and fix flaws in third party
components.
• Xylem applies security validation once the product is materially built through a series of
automated and manual tests to validate that the security protections built into each
product perform as expected. The results from this testing are used to improve the
security protections and the quality of the software in the product.
• Xylem maintains relationships with customers, integrators, and the cybersecurity
research community and the Product Security Incident Response Team (PSIRT)
coordinates the collection, analysis, remediation, and responsible disclosure of
vulnerability and remediation information to keep products secure.
• Xylem monitors as components approach end-of-support and end-of-life and proactively
communicate with customers regarding product lifecycle implications.
• Product security is governed through a three lines of defense model, in which product
engineers are the first-line building security features in to their development backlogs and
scheduling testing, the product security leaders and engineers provide credible
challenges and shared resources to enhance native abilities, and the audit team monitors
fulfillment of security development processes.
10.2 Optimyze Security Features
Xylem prioritizes the availability, integrity, and confidentiality in all products.
Security
consideration
Configuration
Physical
• Device is hardened with upgrades available via the mobile app
• Firmware is encrypted and digitally signed and verified at runtime
• Bootloader integrity is maintained by signing the binaries at the source and then
verifying the same at the device.
• Authenticated and authorized Xylem developer is allowed to trigger the update to
devices; end user needs to approve it from the mobile app.
• Protective coating is applied to the board to avoid physical tampering.
• Automatic reset of the device in the state of fault triggers by implementing
watchdog timers.
• Strict BLE pairing with only authorized devices is implemented.
10 Cybersecurity
50
Smart Pump Range INSTRUCTION MANUAL
Содержание GOULDS e-AB Series
Страница 1: ...INSTRUCTION MANUAL IM326 Rev 2 Smart Pump Range Variable Speed Pump Unit...
Страница 2: ......
Страница 55: ......