Cyber Security Legal Disclaimer; Deployment Guidelines - ABB HiPerGuard MV UPS User Manual

Medium voltage ups
Hide thumbs Also See for HiPerGuard MV UPS:
Table of Contents

Advertisement

2.

Cyber Security Legal Disclaimer

Overview
This product is designed to be connected to and to communicate information and data via network
interface.
It is the customer's sole responsibility to provide and continuously ensure a secure connection between
the product and customer network or any other network (as the case may be). Customer shall establish
and maintain any appropriate measures (such as but not limited to the installation of firewalls,
application of authentication measures, encryption of data, installation of anti-virus programs, etc.) to
protect the product, the network, its system and the interface against any kind of security breaches,
unauthorized access, interference, intrusion, leakage and/ or theft of data or information.
ABB and its affiliates are not liable for damages and/or losses related to such security breaches, any
unauthorized access, interference, intrusion, leakage and/or theft of data or information.
2.1.

Deployment guidelines

The recommended Cyber Security deployment for the HiPerGuard MV UPS is for it to be only used in a
trusted network with restricted access. The user is responsible for creating a defense-in-depth
protection by allocating firewall solutions to each network.
For secure remote access, use a VPN connection – the HiPerGuard MV UPS is not approved by ABB for
direct Internet connection. The user of the product should be aware that the unsecure nature of the
Modbus TCP protocol exposes the communication between the product and the control system.
Authentication and integrity of transmitted information is not provided by the protocol. This enables
certain types of attacks, such as man-in-the-middle attacks, eavesdropping attacks and replay attacks
for instance. The main security is provided through monitoring cybersecurity, topology (asset
management) and correct operation of the data networks using the cybersecurity monitoring modules
and features of the firewalls and managed switches.
HI PE RG UA RD M V UP S U S E R M A N UA L
C YB E R S EC U RI T Y LEG A L D IS C L A IM E R
19/103

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents