Security planning
1.4
Impact of device requirements on system planning
19
UM Security BRS-2A
Release
8.7
05/2022
Digital Input
If you plan to use the Digital Input, consider the following security aspects:
To help protect the device, connect the Digital Input only to a circuit that meets the device
requirements.
To help protect your system, connect the Digital Input only to circuits that do not have explicit
security or safety requirements.
Device and port LEDs
The device and port LEDs show important information about the device state and the port states.
To prevent information leakage, consider the following security aspects as needed in addition to
the secure installation location:
Install the device in a cabinet with an opaque door.
Cover or obstruct the LEDs with a removable cover.
1.4.2
Plan a dedicated user account login policy
The device lets you configure a login policy for the user accounts. The login policy applies to all
user accounts.
It applies to the following user interfaces and access protocols:
The Command Line Interface (CLI) using SSH or Telnet
The Graphical User Interface (GUI) using HTTPS or HTTP
You can configure the following requirements for the user login:
Maximum number of failed user logins in a row until the device locks the respective user
account.
Waiting time (Login attempts period) before the device auto-unlocks a locked user account.
Access to the CLI using the serial connection is exempt from the login policy. Users accessing the
CLI using the serial connection have an unlimited number of login attempts. They are also not
required to wait for the next login attempt, that is, the Login attempts period does not apply. This
ensures access to the device management in situations where availability may be critical, and for
users who already have physical access to the device.
Note:
Hirschmann recommends planning an overarching user account login policy and apply it to
each device.
1.4.3
Plan a dedicated user account password policy
The device lets you configure a password policy for the user accounts. You can configure the
following requirements for the password:
Minimum password length
Minimum number of uppercase characters
Minimum number of lowercase characters
Minimum number of digits
Minimum number of special characters
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......