Section 3: Security Recommendations; User Guidelines; Potential Risks; Unauthorized Access - Honeywell HW-AV-LTE-M Installation And Operation Manual

Clss pathway
Hide thumbs Also See for HW-AV-LTE-M:
Table of Contents

Advertisement

Honeywell Connected Life Safety Services | Honeywell Connected Life Safety Services

SECTION 3: SECURITY RECOMMENDATIONS

3.1 USER GUIDELINES

An Administrator should observe the following guidelines:
Regularly review the user roles and permissions for a CLSS account
l
Immediately remove users who should no longer have access to CLSS
l
Setup each employee with their own unique login under the "Customer and Employee Management" section of CLSS
l
A technician should observe the following guidelines:
Use discretion to allow or deny a location access request
l

3.2 POTENTIAL RISKS

Security threats applicable to networked systems include unauthorized access, communication snooping, viruses, and other
malicious software agents.

3.2.1 UNAUTHORIZED ACCESS

Unauthorized access results from unsecured user name and password, uncontrolled access to the equipment, or uncontrolled and
unsecured access to the network. It results the following:
Loss of system availability
l
Incorrect execution of controls causing damage to the equipment
l
Incorrect operation, spurious alarms, or both
l
Theft or damage to the contents of the system
l
Capture and modification or deletion of data causing possible liability to the installation Site and Honeywell
l

3.2.2 USER ACCESS AND PASSWORDS

Observe the following good practices:
Ensure physical security of passwords. Avoid writing user names and passwords where they can be seen by unauthorized
l
personnel.
Ensure that passwords contain characters, numbers, and a mix of lower and uppercase letters.
l
Passwords should be complex and not easily guessed and should not contain phrases used in common speech.
l
Do not use personally identifiable information as a password, such as national identification numbers, addresses, and birth dates.
l
Set the minimum level of access for each user.
l
Do not provide users with privileges that they do not need.
l
Periodically audit user accounts and remove any that are no longer required.
l
Installation and Operation Manual | REV. B
9
Wednesday, February 28, 2024

Advertisement

Table of Contents
loading

Table of Contents