Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 200
•
•
•
•
•
•
•
•
•
•
•
•
Deploy adequate network protection devices like Firewalls, Intrusion Detection / Protection devices,
Please find detailed information about various Network level protection strategies in Eaton Cybersecurity Considerations for
Electrical Distribution Systems [R1]. Use the below information for configuring the firewalls to allow needed access for Network
module to operate smoothly.
Navigate to
Information>>>Specifications/Technical characteristics
to get the list of all ports and services running on the device.
SNMP V1/SNMP V3 can be disabled or configured by navigating to
Contextual help>>>Settings>>>SNMP
.
Instructions are available in the
Contextual help>>>Settings>>>SNMP
.
5.2.2.5
Logging and Event Management
Best Practices
Eaton recommends that all remote interactive sessions are encrypted, logged, and monitored including all administrative and
maintenance activities.
Ensure that logs are backed up, retain the backups for a minimum of 3 months or as per organization’s security policy.
Perform log review at a minimum every 15 days.
Navigate to
Information>>>List of events codes
to get log information and how to export it.
5.2.2.6
Secure Maintenance
Best Practices
5.2.2.6.1 Apply Firmware updates and patches regularly
Due to increasing Cyber Attacks on Industrial Control Systems, Eaton implements a comprehensive patch and update process for
its products. Users are encouraged to maintain a consistent process to promptly monitor for fresh firmware updates, implement
patching and updates as and when required or released.
Navigate in the help to
Contextual help>>>Maintenance>>>Services
to get information on how to upgrade the Network Module.
Eaton also has a robust vulnerability response process. In the event of any security vulnerability getting discovered in its
products, Eaton patches the vulnerability and releases information bulletin through its cybersecurity web site -
and patch through www.eaton.com/downloads.
Conduct regular Cybersecurity risk analyses of the organization /system.
Eaton has worked with third-party security firms to perform system audits, both as part of a specific customer’s deployment and
within Eaton’s own development cycle process. Eaton can provide guidance and support to your organization’s effort to perform
regular cybersecurity audits or assessments.
5.2.2.6.2 Plan for Business Continuity / Cybersecurity Disaster Recovery
It’s a Cybersecurity best practice for organizations to plan for Business continuity. Establish an OT Business Continuity plan,
periodically review and, where possible, exercise the established continuity plans. Make sure offsite backups include
Backup of the latest f/w copy of Network module. Make it a part of SOP to update the backup copy as soon as the latest f/w
is updated on Network module.
Backup of the most current configurations.
Documentation of the most current User List.
Save and store securely the current configurations of the device.
5.2.3
References
[R1]
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdf
[R2]
Cybersecurity Best Practices Checklist Reminder (WP910003EN):
Summary of Contents for Network-M2
Page 1: ...UPS Network Management Card Network M2 User s Guide English 10 15 2020 2 0 5 ...
Page 2: ......
Page 24: ...Configuring Modbus Installing the Network Management Module 24 ...
Page 25: ...Configuring Modbus Installing the Network Management Module 25 ...
Page 26: ...Configuring Modbus Installing the Network Management Module 26 ...
Page 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Page 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...
Page 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...
Page 64: ...Protection Contextual help of the web interface 64 Example 2 Immediate OFF Example 4 Custom ...
Page 65: ...Protection Contextual help of the web interface 65 Settings 1 ...
Page 261: ...Acronyms and abbreviations Information 261 ...
Page 268: ......