User Access And Passwords; Networks, Firewalls & Vpn Connections; Physical Access; Firewall And Dmz - Honeywell Touchpoint Pro Security Manual

Hide thumbs Also See for Touchpoint Pro:
Table of Contents

Advertisement

5.2.4

User Access and Passwords

Good password security practices should be followed.
1.
Require the use of strong passwords and user account controls.
2.
Ensure physical security of passwords. Avoid writing user names and passwords where they can be seen by
unauthorised personnel.
Computers connected to TPPR systems should not be left unattended when a configuration session is open. Access should
be restricted to authorised users.
5.2.4.1
TPPR Passwords
TPPR passwords are not held or stored on computers running PC Configuration Software or Webserver clients. Remote
users are required to log in after connection. Physical security of TPPR passwords should be maintained at computers used
for remote connection.
5.3 Networks, Firewalls & VPN connections
5.3.1

Physical Access

Physical access to network nodes and infrastructure should be limited to authorised personnel to prevent tampering.
5.3.2

Firewall and DMZ

The network design should limit the access to the TPPR system from the wider network, for instance by use of local firewalls
or DMZ area. The number of components in the same area as the TPPR should be kept to the minimum, especially when
the configuration port may be in use.
5.3.3

Internet and VPN

Where access from untrusted networks is required, such as internet access, a VPN must be used to ensure the security of
the connection.
Pt. No. 2400M2567_1
MITIGATION STRATEGIES
10
Touchpoint Pro
Security Guide

Advertisement

Table of Contents
loading

Table of Contents