Section 3 Cyber security3.1 Cyber security definitionCyber security aims to secure the properties of the organization against security risks.To strengthen the system and increase the security level towards any cyber securityattacks from the Internet, certain actions are recommended while configuring thedevice.• The device should be installed physically secure, for example, in a lockedcabinet.• The latest security updates need to be installed for all network devices.• The network inventory needs to be documented and kept up to date.• Unused services and interfaces should always be disabled.• Only VPN connections should be used to access remote networks.3.2 Configuring firewall and servicesEnable the firewall and disable the unused services and interfaces in the device. Tostart, disallow traffic and allow only the needed traffic. Use the default policy to dropconnections.• Check that the firewall is enabled.• For incoming connections, always filter (drop) all unused ports which mayinclude DNS, L2TP-VPN, SNMP and so on.• Check that the default action is “drop” in firewalls and allow only the neededports.• Set unique passwords for each device.• Keep passwords stored in a safe place, for example, Encrypted passwordmanagement tool.• Check that all unused services are disabled.• If possible, allow IP connections only via VPN.• Disable all unused services, for example, Dial-in, SMSconfig, serial and SNMP.• Back up the configuration.1MRS758861 A Section 3Cyber securityARM600 15User Manual