1MRS758267
Issued: 13.3.2015
Version: A/24.5.2017
COM600 series 5.0
Cyber Security Deployment Guideline
Contents:
1.
About this manual .................................................................................. 5
1.1.
Copyright ........................................................................................ 5
1.2.
Disclaimer ..................................................................................... 5
1.3.
Conformity ..................................................................................... 6
1.4.
Trademarks .................................................................................... 6
1.5.
1.6.
Use of symbols .............................................................................. 7
1.7.
Terminology .................................................................................... 7
1.8.
Abbreviations ................................................................................. 8
1.9.
Related documents ........................................................................ 9
2.
Introduction ........................................................................................... 10
2.1.
2.2.
2.3.
Overview ...................................................................................... 11
3.
Security Guidelines .............................................................................. 13
3.1.
Access Control ............................................................................. 13
3.1.1.
Access Control .............................................................. 13
3.1.2.
BIOS access ................................................................. 13
3.1.3.
User Accounts ............................................................... 13
3.1.4.
User groups .................................................................. 14
3.1.5.
3.2.
Ports and services ....................................................................... 16
3.2.1.
Ports and services ........................................................ 16
3.2.2.
Ports .............................................................................. 16
3.2.3.
3.2.4.
3.2.5.
Remote desktop ............................................................ 23
3.2.6.
Time service .................................................................. 24
3.3.
3.3.1.
3.3.2.
3.4.
3.4.1.
3.4.2.
3.5.
3.5.1.
4.
Appendix 1 ........................................................................................... 31
4.1.
5.
Appendix 2 ........................................................................................... 32
3