Cybersecurity recommended secure hardening guidelinesSecuring the Network Management Module – 211••••••••••••••••••••••••5.2 Cybersecurity recommended secure hardening guidelinesIntroductionSecure configuration guidelinesAsset ManagementDefense in DepthRisk AssessmentPhysical SecurityAccount managementTime SynchronizationDeactivate unused featuresNetwork SecurityRemote accessLogging and Event ManagementMalware defensesSecure MaintenanceBusiness Continuity / Cybersecurity Disaster RecoverySensitive Information DisclosureDecommissioning or ZeroizationReferences5.2.1 IntroductionThis Network module has been designed with cybersecurity as an important consideration. Number of features are offered in theproduct to address cybersecurity risks. These Cybersecurity Recommendations provide information to help users to deploy andmaintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity Recommendations are not intendedto provide a comprehensive guide to cybersecurity, but rather to complement customers’ existing cybersecurity programs.Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its productsand solutions, making them more secure, reliable and competitive for customers.The following whitepapers are available for more information on general cybersecurity best practices and guidelines:Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN): http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdfCybersecurity Best Practices Checklist Reminder (WP910003EN): http://www.cooperindustries.com/content/dam/public/powersystems/resources/library/1100_EAS/WP910003EN.pdfCybersecurity Best Practices for Modern Vehicles - NHTSA: https://www.nhtsa.gov/staticfiles/nvs/pdf/812333_CybersecurityForModernVehicles.pdf5.2.2 Secure configuration guidelines5.2.2.1 Asset ManagementKeeping track of software and hardware assets in your environment is a pre-requisite for effectively managing cybersecurity. Eatonrecommends that you maintain an asset inventory that uniquely identifies each important component.To facilitate this, Network module supports the following identifying information:5.2.2.1.1 Network Module identification and its firmware informationIt can be retrieved by navigating toCard>>>System information or Maintenance>>>System information.IdentificationSystem nameProductPhysical nameVendorUUIDPart number