Siemens 9810 Series User Manual page 23

Hide thumbs Also See for 9810 Series:
Table of Contents

Advertisement

9410 series - User manual
The following table lists the actions we recommend you take to help secure your device in a
protected environment, organized by life-cycle stage:
Recommended action
Plan
Review
awareness
Review the
defense in depth
assumptions
Review the
capabilities
Review the
and mitigation strategies"
on page 30
Review the
and mitigation strategies
Configure
Change the default
password
Disable meter
configuration methods
Disable webpages and
time sync sources
Define lockouts and event
timeouts
Limit user
Edit meter access event
logging
7EN05-0336-09
Defense-in-depth role
cybersecurity
Resources to increase your cybersecurity knowledge and
awareness.
system
Understand the security measures expected to be provided by the
external environment in which the device is to be used.
device security
Understand how the device's security capabilities can be used in a
protected environment.
"Security risks
Known security risks and the mitigation strategies to help minimize
the risks.
Security risks
Known security risks and the mitigation strategies to help minimize
the risks.
Help reduce unauthorized access. Default account settings are
*
often the source of unauthorized access by malicious users.
Limiting configuration options and providing read-only access
*
reduces the attack surface of the meter.
Disable webpages to deny a web browser to access the meter
data. If your meter can be accessed by a web browser outside
your protected network, a malicious user could intercept
communications.
*
Disable the ability to modify the meter's time source to help protect
against disguised communication from an unknown source as
being trusted and possibly invalidating timestamps.
Lock accounts after a predefined number of unsuccessful login
attempts. Lockouts help reduce brute-force password attacks from
*
succeeding.
Limit user access to the minimum, least privilege level of access
needed to perform their job functions.
access*
Revoke user privileges when no longer needed due to role
change, transfer, or termination.
Edit the default meter access event priorities that are logged to the
*
event log to meet your reporting requirements.
Cybersecurity
23

Advertisement

Table of Contents
loading

This manual is also suitable for:

9410 series

Table of Contents