User's Manual
INTRODUCTION
CYBERSECURITY
KleeYa - User Manual - Version 2 1-23
B) Recommended actions/behavior
All passwords are to be treated as sensitive, confidential information.
1. Access; only allow legitimate and trained users access to the KleeYa System
with a password.
2. Individuality; each user shall have its own user name. Do not reuse the
password for personal access for the KleeYa System.
3. Sharing passwords; passwords shall not be exchanged between authorized
users.
4. Recording passwords; do not write down or otherwise record passwords,
where they are accessible or recognizable by anyone else. This includes
storage on personal computers.
5. Remember password features shall not be used on any application or the
KleeYa System.
6. An account management process shall be implemented.
7. Limit the number of privileged accounts to those who have a legitimate
activity.
8. Disable accounts immediately upon termination of an employee or contractor.
Disabling instead of deleting accounts allows preservation of audit trails
should an investigation be necessary.
9. Password change; passwords should be changed periodically as required.
10. Logout when you expect to be away from the KleeYa System for an extended
period of time.
1.7.6 UNAUTHORIZED ACCESS VIA THE
NETWORK
In case the computer of the KleeYa System is connected to a network, it is possible
that unauthorized access is made by criminally motivated hackers and theoretically
the software and data could then be modified in an unpredictable way, potentially
leading to software malfunction, software and data loss, corruption or unauthorized
distribution.
In order to avoid such a scenario, the integrated firewall of the Operating System is
activated, denying remote access in accordance with the intended use of the KleeYa
System. This integrated security measure controls network traffic to and from a
computer.
1.7.7 REMOTE ACCESS
The KleeYa System might be connected to servers used by STRATEC or its contractual
distribution partners for the purpose of health monitoring, troubleshooting in case
of issues, standard customer support and software updates. In order to allow such
additional services, software installation on the computer of the KleeYa System
might be required.
However, such a connection is only be available in dedicated countries in alignment
of the technical infrastructure and the respective regulations.
If such an application is installed on the KleeYa System the remote connection will
be hosted by communication channels undergoing cryptography, which prevent