Honeywell Touchpoint Pro Security Manual
Honeywell Touchpoint Pro Security Manual

Honeywell Touchpoint Pro Security Manual

Hide thumbs Also See for Touchpoint Pro:

Advertisement

Security Guide
Touchpoint Pro
AN0989_Iss 1
Touchpoint Pro
Pt. No. 2400M2563_1_EN
1
Webserver User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Honeywell Touchpoint Pro

  • Page 1 Security Guide Touchpoint Pro AN0989_Iss 1 Touchpoint Pro Pt. No. 2400M2563_1_EN Webserver User Guide...
  • Page 2 Revision History Revision Comment Date Issue 01 A04815 Nov 2016 Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
  • Page 3 LEGAL NOTICES Disclaimer In no event shall Honeywell be liable for any damages or injury of any nature or kind, no matter how caused, that arise from the use of the equipment referred to in this manual. Strict compliance with the safety procedures set out and referred to in this manual, and extreme care in the use of the equipment, are essential to avoid or minimise the chance of personal injury or damage to the equipment.
  • Page 4: Table Of Contents

    Threats ............................. 7 Unauthorised access ......................7 Communications snooping ....................7 Viruses and other malicious software agents ..............7 Mitigation Strategies ........................8 Touchpoint Pro System ....................... 8 5.1.1 Monitor System Access ....................8 5.1.2 User Access and Passwords ..................8 5.1.3...
  • Page 5: Introduction

    It provides information supporting identification and mitigation of security risks associated with the day to day use of the system in connected IT infrastructures 2.1 Scope This document applies to Touchpoint Pro systems in a networked environment, associated computers, and data storage media. 2.2 Assumptions and pre-requisites This guide assumes a high degree of technical knowledge and familiarity with: •...
  • Page 6: It System Architecture

    IT ARCHITECTURE 3 IT System Architecture Touchpoint Pro may be configured in a variety of network topologies, from simple peer to peer or isolated LAN to a corporate network with internet access. This guide is primarily concerned with systems connected to a WAN or corporate network with possible Internet access.
  • Page 7: Threats

    The capture, modification, or deletion of data, including configuration data and device logs Viruses can be transmitted by media such as USB memory devices and SD cards, from other infected systems on the network, and from infected or malicious Internet sites. Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
  • Page 8: Mitigation Strategies

    5.1.2 User Access and Passwords Touchpoint Pro has three levels of user. Users at each level have unique usernames and passwords. Observe the following good practice: Ensure physical security of passwords. Avoid writing user names and passwords where they can be seen by unauthorised personnel.
  • Page 9: Software And Unusual Operation

    5.1.3 Software and Unusual Operation Touchpoint Pro isolates the gas detection system from the user interface. If unusual operation is observed on the user interface, the following measures may be taken: Restart the user interface to reload the software. This will not interrupt operation of the gas detection system,...
  • Page 10: User Access And Passwords

    5.3.3 Internet and VPN Where access from untrusted networks is required, such as internet access, a VPN must be used to ensure the security of the connection. Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
  • Page 11: Glossary

    De-Militarized Zone, used to restrict access from parts of a network https Hypertext Transfer Protocol secure version Local Area Network Personal Computer Secure Digital memory card TPPR Touchpoint Pro gas detection system Universal Serial Bus memory devices Virtual Private Network Touchpoint Pro Pt. No. 2400M2567_1 Security Guide...
  • Page 12 Data may change as well as legislation and you are strongly advised to obtain copies of the most recently issued regulations, standards and guidelines. This publication is not intended to form the basis of a contract. Part Number 2400M2567 Issue 1 © 2016 Honeywell Analytics...

Table of Contents