background image

10  Cybersecurity

Xylem values system security and resilience. Defending against cybersecurity threats is a

shared responsibility. Xylem builds products that are secure by design. Our customers have

a responsibility to understand the risks inherent in their processes and take steps to operate

and maintain their solutions securely. This section reviews security features and provides

guidance to help securely operate this product. For details and updates on Xylem product

cybersecurity visit 

https://www.xylem.com/en-us/about-xylem/cybersecurity/

.

10.1  Xylem Product Cybersecurity

Xylem performs appropriate due care in building security and resilience into products. Xylem

performs the following security activities for defense-in-depth:

• security engineers perform threat modeling to identify testable controls
• code is scanned for flaws with static analysis tools and hardened

• product components are analyzed and hardened

• security controls are verified through automated and manual tests

• Xylem maintains relationships with customers, integrators, and the cybersecurity

research community and the Product Security Incident Response Team (PSIRT)

coordinates the collection, analysis, remediation, and responsible disclosure of

vulnerability and remediation information to keep products secure

• cloud connections, data flows, and cloud infrastructure are continuously monitored by the

Product Security Operations Center (PSOC)

• Product security is governed through a three lines of defense model that includes:

product developers, product security engineers, and audit staff

10.2  Security Recommendations for End-User

optimyze Gateway has been tailored for very specific condition monitoring applications, as

such most security hardening is already in place. The following guidance provides

recommendation for customers for hardening the operating environment, secure operations,

account management, and disposal. In the table below: 

Safeguards describe the security

guidance, 

Security Context & Rationale provide overview of security features and value of

the security safeguard, and 

References provide additional resources for further investigation

for implementing the recommended safeguards. 

Safeguard

Security Context & Rationale

References

Restrict physical access

• Ensure physical access to

assets is limited. Include

physical isolation to protect the

environment and equipment

therein.

• Ensure strict control over

physical access in and out of

the facility.

Each of the communication ports

have been hardened to restrict

access and ensure integrity of

device operations. For example,

data transit to the cloud is

encrypted and the device is

provisioned before shipping. BLE

pairing requires proximity and the

magnetic key on the optimyze

sensor. Command line connection

requires authentication. This

safeguard supports the ability to

further limit exposure associated

with physical threats to the device

itself.

ATT&CK for ICS: M0801
NIST SP 800-53 Rev5: AC-3,

PE-3
ISA/IEC 62443-3-3: SR 2.1

10  Cybersecurity

14

optimyze

 Gateway Instruction, Operation, and Maintenance Manual

Summary of Contents for optimyze

Page 1: ...Instruction Operation and Maintenance Manual P2007090 Rev 1 optimyze Gateway...

Page 2: ......

Page 3: ...ns 7 4 2 LEDs 7 5 Installation 8 5 1 Precautions 8 5 2 Mounting options 8 6 Operation 9 6 1 Configure and install the optimyze sensors 9 6 2 Set up optimyze Gateway 9 6 3 Unpairing 9 7 Troubleshooting...

Page 4: ...11 Certifications 17 11 1 For U S 17 11 2 For Canada ISED 18 11 3 UK UKCA 18 11 4 EU Regulatory 18 Table of Contents 2 optimyze Gateway Instruction Operation and Maintenance Manual...

Page 5: ...fety terminology and symbols About safety messages It is extremely important that you read understand and follow the safety messages and regulations carefully before handling the product They are publ...

Page 6: ...t and safety devices Use personal protective equipment as needed Examples of personal protective equipment include but are not limited to hard hats safety goggles protective gloves and shoes and breat...

Page 7: ...e packing materials from the product Dispose of all packing materials in accordance with local regulations 2 To determine whether any parts have been damaged or are missing examine the product 3 If th...

Page 8: ...Compact Form Factor 110 3 mm 4 4 in x 99 2 mm 3 9 in x 35 4 mm 1 4 in Visual status indication LED Clear indication of optimyze Gateway status See Button locations on page 7 for different status info...

Page 9: ...elow LED color LED Description Blue 5 second single blink Normal mode 1 second blink Pairing mode On Connected over Bluetooth to optimyze sensor Triple blink Successful new Bluetooth pairing with an o...

Page 10: ...ng the unit on a vertical surface The screw head diameter can be no larger than 7 mm with a maximum thread diameter of 3 75 mm and a head height of 3 2 mm When the screw is installed in the mounting s...

Page 11: ...ED blinks pink b Once the sensor is in configuration mode press Bluetooth button on the optimyze Gateway Blue LED starts blinking with a one second interval indicating pairing mode is active Pairing m...

Page 12: ...y because of lacking network coverage optimyze sensor is in configuration mode and Gateway is in pairing mode but they are not pairing optimyze sensor may not be in pairing range 6 sensors may already...

Page 13: ...95 non condensing Power supply Feature Value Operating location Indoor use Operating environment Non hazardous non corrosive Operating temperature 0 C to 40 C 32 F to 104 F Storage temperature 20 C to...

Page 14: ...ature Value Weight for Gateway boxed kit without power supply 0 518 lbs 0 24 kg Weight for Power Supply 0 300 lbs 0 14 kg 8 7 Part numbers Part Part number optimyze Gateway w USB cable P2007065 Power...

Page 15: ...Warranty are warranted only for the balance of the warranty period on the parts that were repaired or replaced Seller shall have no warranty obligations to Buyer with respect to any product or parts...

Page 16: ...ecurity is governed through a three lines of defense model that includes product developers product security engineers and audit staff 10 2 Security Recommendations for End User optimyze Gateway has b...

Page 17: ...erations confirmed tampering or theft of the device Devices are hardened and Xylem provides PSIRT to help customers investigate potential security incidents This safeguard supports the ability to trac...

Page 18: ...hp Mitigations 2 NIST SP 800 53 Rev 5 available online https nvlpubs nist gov nistpubs SpecialPublications NIST SP 800 53r5 pdf 3 ISA IEC 62443 standards available for purchase from ISA IEC or ANSI 10...

Page 19: ...harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause har...

Page 20: ...ding Digital Apparatus Based on this evaluation this product continues to observe compliance to the requirements set forth by The Innovation Science and Economic Development Canada ISED and complies w...

Page 21: ...Page left intentionally blank...

Page 22: ...Page left intentionally blank...

Page 23: ...Page left intentionally blank...

Page 24: ...customers who know us for our powerful combination of leading product brands and applications expertise with a strong focus on developing comprehensive sustainable solutions For more information on h...

Reviews: