EasyManuals Logo
Home>Thytronic>Security Sensors>SME2-IS

Thytronic SME2-IS User Manual

Thytronic SME2-IS
84 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #65 background imageLoading...
Page #65 background image
65
SME2-IS - Manual - 06- 2021
INSTALLATION
6 CYBER SECURITY6 CYBER SECURITY
Preface
The cyber security functions implemented by the SME2-IS mitigate cyber threats, by providing:
• Protected communications between the SME2-IS and the mapped tool viaSSH (Secure SHell)
• Password based user authentication
• Management of authorisations for Role Based Access Control (RBAC)
• Protected log ling (Syslog service)
The following operative areas can be identied:
• Conguration Management
• HW Systems and Networking Equipment
• Initial System Conguration
• Threat and Vulnerability Management
• Access Control
• Authentication and Authorization Management
• Auditing
• Network Communication Security
The described procedures have been selected in consideration of the following standards and
guidelines:
• ISO/IEC 27001:2013
NERC CIPNorth American Electric Reliability Corporation Critical Infrastructure Protection
• IEC 62351
IEC 62351 will be applied if expressly requested, to guarantee control of communications protocols
and data ows.
Configuration management
Conguration management is a set of procedures which control modications to hardware, rm-
ware, software and documentation to ensure that all devices are protected against unwanted mod-
ication before, during and after system implementation.
Hardware systems and networking equipment
The devices are industrial and satisfy industrial quality and EMC standards.
Only passive systems without fans are used for heat management. The devices can be assigned IP
addresses on the basis of pertinent network planning rules. Appropriate HW protection mechanisms
can be implemented on request
(e.g. tamperproong, etc.).
Initial system configuration
The protection relays are equipped only with the network services required to execute their protec-
tion programs, thus limiting the number of open TCP / UDP ports.
All services and operating systems are updated to the latest version at the time of release. Access
even for "known" users is eliminated and only one local non-administrator user is left active to install
and congure the device initially.
Threat and vulnerability management
The device's operating system is supported by the vendor to ensure conformity with regular security
bulletins and patches.
Access control
Further to the local non-administrator user, user authentication can be delegated to a centralised
platform by the RADIUS client, to obtain access to the active Windows directory.
Authentication and authorization management
AAM is based on the “RBAC” (Rule Based Access Control) model, i.e. the device allows execution of
functions in relation to the user's assigned role.
The following roles are available:
• “Administrator”: Complete control of the device
• “Operator1”: Limited Level 1 read/write access
• “Operator2”: Limited Level 2 read/write access
Auditing
The device tracks the most important system operations/actions, like accesses and modications to
the conguration, with a “syslog” service.

Table of Contents

Other manuals for Thytronic SME2-IS

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Thytronic SME2-IS and is the answer not in the manual?

Thytronic SME2-IS Specifications

General IconGeneral
BrandThytronic
ModelSME2-IS
CategorySecurity Sensors
LanguageEnglish