Configuring User Permissions Through Profiles; Decommissioning The Network Management Module - Eaton Network-M2 User Manual

Ups network management card
Hide thumbs Also See for Network-M2:
Table of Contents

Advertisement

https://ics-cert.us-cert.gov/Standards-and-References
[R4] National Institute of Technology (NIST) Interagency "Guidelines on Firewalls and Firewall Policy,
NIST Special Publication 800-41", October 2009:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf

4.3 Configuring user permissions through profiles

The user profile can be defined when creating a new users or changed when modifying an existing one.
Refer to the section Users in the settings.

4.4 Decommissioning the Network Management module

With the increased frequency of reported data breaches, it's becoming more and more necessary for
companies to implement effective and reliable decommissioning policies and procedures in order to protect
the data stored on retired IT equipment from falling into the wrong hands, or a data breach. 
Sanitization erases all the data (user name and password, certificates, keys, settings, logs...).
To sanitize the Network Module refer to: Sanitization
Configuring user permissions through profiles
Securing the Network Management Module  –  83

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents