D3982892

Cybersecurity Recommendations

General Cybersecurity Recommendations

WARNING
hazard of compromised system availability, integrity, and confidentiality
  • Change default passwords to help prevent unauthorized access to device settings and information.
  • Disable unused ports/services to help minimize pathways for malicious attackers.
  • Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).
  • Use cybersecurity best practices (for example, least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, or interruption of services.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

For detailed information about cybersecurity for the SMD, refer to:

For a general introduction to cybersecurity threats and how to address them, refer to How can I Reduce Vulnerability to Cyber Attacks?.

For more information about cybersecurity, visit the Schneider Electric Cybersecurity Support Portal.

Security Features

Security features have been built into the SMD to help the device to operate correctly and behave according to its intended purpose.

The key features are:

  • Authentication when accessing product resources from the HMI.

  • Configurable security services and settings, using the User Management Tool for HMI user definition.

These features provide security capabilities which help to protect the product from potential security threats, which could disrupt the product operation (availability), modify information (integrity) or disclose confidential information (confidentiality).

The security capability features are intended to mitigate the inherent threats which are linked with the use of the SMD in an Operational Technology environment.

However, the effectiveness of these capabilities depends on the adoption and application of the following recommendations:

Potential Risks and Compensation Controls

Area Issue Risk Compensating controls

Unsecure protocols

Modbus and some IT protocols (NTP, DHCP, DNS, and DPWS) are unsecure.

The device does not have the capability to transmit data encrypted using these protocols.

If a malicious user gained access to your network, they could intercept communications.

If transmitting data over an internal network, physically or logically segment the network.

If transmitting data over an external network, encrypt protocol transmissions over all external connections using a VPN or a similar solution.

Wireless radio communication

During the pairing window, unauthorized radio devices may try to join the network.

If a rogue device gained access to your network, they could eavesdrop on the communication of your wireless network, create an integrity data breach (for example, by sending fake data), or create a Denial of Service (DoS).

Reduce commissioning window to limit exposure.

Once the pairing is performed, consult the list of paired devices in SMD configuration using EcoStruxure Power Commission software and make sure that the list of devices contains no unexpected or rogue devices.

Security Recommendations for Commissioning

Refer to Cybersecurity Recommendations.

Security Recommendations for Operation

Refer to Cybersecurity Recommendations.

Security Recommendations for Decommissioning

Refer to Cybersecurity Recommendations.

QR Code is a registered trademark of DENSO WAVE INCORPORATED in Japan and other countries.

Was this helpful?