2 Introduction
This guide has been designed for use by operators and Information Technology (IT) personnel of customers who have a
Honeywell Touchpoint Pro (TPPR) system.
It is intended for use when planning the configuration and maintenance of the network infrastructure in which the TPPR
system exists.
It provides information supporting identification and mitigation of security risks associated with the day to day use of the
system in connected IT infrastructures
2.1 Scope
This document applies to Touchpoint Pro systems in a networked environment, associated computers, and data storage
media.
2.2 Assumptions and pre-requisites
This guide assumes a high degree of technical knowledge and familiarity with:
•
PC administration and operating systems
•
Networking systems and concepts
•
Security issues and concepts
2.3 Related documents
This guide should be read in conjunction with the following documents:
Document
Touchpoint Pro Technical Handbook
Webserver User Guide
PC Configuration Software Operating Manual
2.4 Security Controls
The Touchpoint Pro system has a number of built in security controls. These include:
•
Limitation of access to designated users
•
Password protection of user accounts
•
Secure (https) web server connection
•
Web server device certificate
•
Reduction of confidential data
2.4.1
Additional User Controls
This guide focuses on additional security controls that should be implemented by users.
2.4.2
Further Information
Contact your Honeywell representative if you need more information on securing your TPPR system.
Pt. No. 2400M2567_1
INTRODUCTION
Table 1.
Related Documents
5
Part Number
2400M2501
2400M2563
2400M2564
Touchpoint Pro
Security Guide