Security planning
1.4
Impact of device requirements on system planning
18
UM Security BRS-2A
Release
8.7
05/2022
1.4
Impact of device requirements on system planning
Some requirements of the device have an impact on the system lifecycle phases, in particular on
system planning.
Topics of this interdependence include:
A secure installation location, including the aspects:
–
Device availability: Power supply, power budget, and data link redundancy
–
Properties of the USB port
–
Properties of the Signal Contact
–
Properties of the Digital Input
–
Device and port LEDs
The detailed physical device security requirements
The user account policy parameters the device offers:
–
For the login policy
–
For the password policy
–
For the user name and access role policy
–
For the SNMPv3 authentication and encryption type, and password policy
VLAN ID restrictions arising from certain redundancy protocols: VLAN IDs ≥2 for payload traffic
and device management
Note:
These topics are covered in more detail
(see on page 23 “Device security”)
.
1.4.1
Secure installation location
Refer to the user manual "Installation" for a suitable physical installation location.
Select a location that in addition offers appropriate device security by restricting physical access:
Install the device in a room that can be locked and where only authorized personnel have
access.
Install the device in a cabinet to which only authorized personnel have access.
Install the device in a cabinet with an opaque door
(see on page 19 “Device and port LEDs”)
.
Device availability
Device availability can be an important base for the security of the superordinate system.
Therefore, check that the following device availability requirements are met as needed:
Provide redundant power supply
Provide an adequate power budget (device and PoE)
Provide data link redundancy
Signal Contact
If you plan to use the Signal Contact, consider the following security aspects:
To help protect the device, connect the Signal Contact only to a circuit that meets the device
requirements.
To help protect your system, connect the Signal Contact only to circuits that do not have explicit
security or safety requirements.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......