Cybersecurity - Veris Industries E31E84 Installation Manual

Branch circuit power meter with ethernet communication
Table of Contents

Advertisement

E31E Series Installation Guide

Cybersecurity

Z206855-0D
Page 29 of 35
Alta Labs, Enercept, Enspector, Hawkeye, Trustat, Aerospond, Veris, and the Veris 'V' logo are trademarks or registered trademarks of Veris Industries, L.L.C. in the USA and/or other countries.
Overview
This chapter contains up-to-date information about your product's cybersecurity. Network administrators, system integrators and
personnel that commission, maintain or dispose of a device should:
• Apply and maintain the device's security capabilities. See "Device security capabilities" for more details.
• Review assumptions about protected environments. See "Protected environment assumptions" for more details.
• Address potential risks and mitigation strategies. See "Potential Risks and compensating controls" for more details.
• Follow recommendations to optimize cybersecurity.
Your device has security capabilities that:
• Allow it to be part of a NERC CIP compliant facility. Go to the North American Electric Reliability Corporation website for
information on NERC Reliability Standards.
• Align with cybersecurity standards in the IEC 62443 international standard for business IT systems and Industrial
Automation and Control Systems (IACS) products. Go to the International Electrotechnical Commission website for
information about the IEC 62443 international standard.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY,
INTEGRITY, AND CONFIDENTIALITY
Change default passwords to help prevent unauthorized access to
device settings and information.
Disable unused ports/services and default accounts, where
possible, to minimize pathways for malicious attacks.
Place networked devices behind multiple layers of cyber defenses
(such as rewalls, network segmentation, and network intrusion
detection and protection).
Use cybersecurity best practices (for example: least privilege,
separation of duties) to help prevent unauthorized exposure, loss,
modi cation of data and logs, interruption of services, or
unintended operation.
Failure to follow these instructions can result in death,
serious injury, or equipment damage.
Product Defense In-Depth
Use a layered network approach with multiple security and defense controls in your IT and control system to minimize data
protection gaps, reduce single-points-of-failure and create a strong cybersecurity posture. The more layers of security in your
network, the harder it is to breach defenses, take digital assets or cause disruption.
Device Security Capabilities
This section describes the security capabilities available with your device.
User Accounts
These security capabilities help enforce authorizations assigned to users, segregation of duties and least privilege:
• User authentication is used to identify and authenticate software processes and devices managing accounts.
• Device configuration and security communications configuration.
Hardening
These security capabilities help prohibit and restrict the use of unnecessary functions, ports, protocols and/or services:
• Least functionality can be applied to prohibit and restrict the use of unnecessary functions, ports, protocols and/or
services.
• Port numbers can be changed from default values to lower the predictability of port use.
©2020 Veris Industries USA 800.354.8556 or +1.503.598.4564 / support@veris.com
Other companies' trademarks are hereby acknowledged to belong to their respective owners.
TM
0420

Advertisement

Table of Contents
loading

This manual is also suitable for:

E31e seriesE31e42E31e004E31e002

Table of Contents