Download Print this page

Eaton 93PM G2 User And Installation Manual page 107

50 -360 kva
Hide thumbs Also See for 93PM G2:

Advertisement

Category
Secure maintenance
References:
1. Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN).
eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdf
2. Cybersecurity Best Practices Checklist Reminder (WP910003EN).
com/content/dam/public/powersystems/resources/library/1100_EAS/WP910003EN.pdf
3. NIST SP 800-82 Rev 2, Guide to Industrial Control Systems (ICS) Security, May 2015. https://
ics-cert.us-cert.gov/Standards-and-References
4. National Institute of Technology (NIST) Interagency "Guidelines on Firewalls and Firewall Policy,
NIST Special Publication 800-41", October 2009.
nistspecialpublication800-41r1.pdf
EATON 93PM G2 UPS
USER'S AND INSTALLATION
GUIDE
Description
Best practices:
Apply firmware updates and patches regularly.
Due to increasing cyber attacks on industrial control systems, our
company implements a comprehensive patch and update process for
its products. Users are encouraged to maintain a consistent process to
promptly monitor for fresh firmware updates, implement patching and
updates as and when required or released.
Our company will upgrade the UPS firmware from time to time. If any
site needs to upgrade firmware, they can contact the service center for
upgrade.
Our company also has a robust vulnerability response process. In the
event of any security vulnerability getting discovered in its products,
our company patches the vulnerability and releases an information
bulletin through its cybersecurity web site:
Conduct regular cybersecurity risk analyses of the organization/
system.
Our company has worked with third-party security firms to perform
system audits, both as part of a specific customer's deployment and
within our company's own development cycle process. Our company
can provide guidance and support to your organization's effort to
perform regular cybersecurity audits or assessments.
Plan for business continuity/cybersecurity disaster recovery.
It is a cybersecurity best practice for organizations to plan for business
continuity. Establish an OT business continuity plan, periodically
review and, where possible, exercise the established continuity plans.
Make sure offsite backups include:
A backup of the most current configurations
Documentation of the most current user list
http://eaton.com/cybersecurity.
http://www.cooperindustries.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/
P-164000956 - February 2021
http://www.
www.eaton.eu
1 1 0 0 7 7

Advertisement

loading