Commissioning Instructions

Cybersecurity disclaimer
A6V12006922
Restricted
3 | 21
Network setup must avoid direct connection from Internet to the end device.
- Implement Port Security to disallow the connection and network participation of any
unauthorized laptop/device to a switch.
- Unauthorized access should be prevented by physical security measures. Meaning, access
to the devices (controllers) must be limited only to people who require it. Equipment can
further be monitored via CCTV.
- When possible, physically segment control systems from non-control systems. Apply the
concept of Least Privilege to minimize the impact in case of a compromise of user
credentials.
- Ensure that complex and strong passwords are required. Furthermore, ensure that
administrator passwords are at least 12 characters long for users with administrative
privileges and at least 8 characters long for non-administrative users.
- Ensure that the same username/password credentials are unique for each site within the
country/office.
- Ensure that users each have their own individual unique login accounts. User accounts
must not be shared.
- Configure account lockout settings (Threshold, Observation Windows, Duration) to protect
the system from password guessing or brute force attacks.
- Ensure that accounts are removed within a reasonable time when users no longer work at
the site.
- Ensure that firmware is downloaded only from legitimate / known locations.