Cybersecurity Recommendations
General Cybersecurity Recommendations
WARNING |
|---|
|
hazard of compromised system availability, integrity,
and confidentiality
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
|
For detailed information about cybersecurity for the SMD, refer to:
-
HMIST6700 Hardening Guide
For a general introduction to cybersecurity threats and how to address them, refer to How can I Reduce Vulnerability to Cyber Attacks?.
For more information about cybersecurity, visit the Schneider Electric Cybersecurity Support Portal.
Security Features
Security features have been built into the SMD to help the device to operate correctly and behave according to its intended purpose.
The key features are:
-
Authentication when accessing product resources from the HMI.
-
Configurable security services and settings, using the User Management Tool for HMI user definition.
These features provide security capabilities which help to protect the product from potential security threats, which could disrupt the product operation (availability), modify information (integrity) or disclose confidential information (confidentiality).
The security capability features are intended to mitigate the inherent threats which are linked with the use of the SMD in an Operational Technology environment.
However, the effectiveness of these capabilities depends on the adoption and application of the following recommendations:
-
Recommendations provided in this chapter to cover the commissioning, operation, maintenance, and decommissioning of the product.
Potential Risks and Compensation Controls
| Area | Issue | Risk | Compensating controls |
|---|---|---|---|
|
Unsecure protocols |
Modbus and some IT protocols (NTP, DHCP, DNS, and DPWS) are unsecure. The device does not have the capability to transmit data encrypted using these protocols. |
If a malicious user gained access to your network, they could intercept communications. |
If transmitting data over an internal network, physically or logically segment the network. If transmitting data over an external network, encrypt protocol transmissions over all external connections using a VPN or a similar solution. |
|
Wireless radio communication |
During the pairing window, unauthorized radio devices may try to join the network. |
If a rogue device gained access to your network, they could eavesdrop on the communication of your wireless network, create an integrity data breach (for example, by sending fake data), or create a Denial of Service (DoS). |
Reduce commissioning window to limit exposure. Once the pairing is performed, consult the list of paired devices in SMD configuration using EcoStruxure Power Commission software and make sure that the list of devices contains no unexpected or rogue devices. |
Security Recommendations for Commissioning
Refer to Cybersecurity Recommendations.
Security Recommendations for Operation
Refer to Cybersecurity Recommendations.
Security Recommendations for Decommissioning
Refer to Cybersecurity Recommendations.
WARNING