1 Contents
1
Contents ........................................................................................................................................... 4
2
Introduction ..................................................................................................................................... 5
2.1
Scope .................................................................................................................................. 5
2.2
2.3
Related documents ............................................................................................................. 5
2.4
Security Controls ................................................................................................................. 5
2.4.1
Additional User Controls ................................................................................................ 5
2.4.2
Further Information ........................................................................................................ 5
3
IT System Architecture ................................................................................................................... 6
3.1
3.2
4
Threats ............................................................................................................................................. 7
4.1
Unauthorised access .......................................................................................................... 7
4.2
Communications snooping .................................................................................................. 7
4.3
5
Mitigation Strategies ....................................................................................................................... 8
5.1
Touchpoint Pro System ....................................................................................................... 8
5.1.1
Monitor System Access ................................................................................................. 8
5.1.2
5.1.3
5.1.4
Memory Media ............................................................................................................... 9
5.1.5
Configuration Port .......................................................................................................... 9
5.1.6
5.2
Computers and Access ....................................................................................................... 9
5.2.1
Operating Software ........................................................................................................ 9
5.2.2
Virus Protection ............................................................................................................. 9
5.2.3
Files and Media ............................................................................................................. 9
5.2.4
5.3
5.3.1
Physical Access ........................................................................................................... 10
5.3.2
Firewall and DMZ ......................................................................................................... 10
5.3.3
Internet and VPN ......................................................................................................... 10
6
Glossary ......................................................................................................................................... 11
6.1
Abbreviations .................................................................................................................... 11
Pt. No. 2400M2567_1
CONTENTS
4
Touchpoint Pro
Security Guide