Security Considerations For Your Network; How To Report A Vulnerability; Implementing Stringent Password Guidelines - Honeywell EK205-M Operating Instructions Manual

Volume conversion device
Table of Contents

Advertisement

General

Security considerations for your network

2
EK series volume converters are used in modern billing infrastructures and network control
systems to supply process information such as meter readings, measurements and messages to
a billing or control centre. A connection of this type constitutes a significant security risk which
must be given careful consideration when designing the network.
2.1

How to report a vulnerability

A vulnerability is defined as an error or weakness in the software which can be exploited to
adversely affect or reduce the operation or security of the parameterization or device software.
Honeywell reviews all reports about vulnerabilities relating to Honeywell products and services.
You can find further information about the Honeywell Security Policy at:
www.honeywell.com/product-security
If you would like to report a possible vulnerability in a Honeywell product, follow the instructions
on the Honeywell website at:
www.honeywell.com/product-security
You can find information about current malware threats at:
www.honeywellprocess.com/en-US/support/Pages/security-updates.aspx
Or
Contact your local Honeywell Process Solutions Customer Contact Centre (CCC) or our Elster
Gas Technical Support team (see section 1.4.1 "Customer services and repairs", page 11).
2.2

Implementing stringent password guidelines

Since various types of attacks on passwords take place these days, you should follow best
practices for password management. Here are a few time-tested methods:
Change standard passwords
Use secure passwords. A secure password for LIS devices consists of eight characters.
Change passwords on a regular basis.
Change passwords immediately in case someone has tried to attack the system.
LIS200 uses role-based authentication, please follow best practices for shared passwords
like secured distribution and secured storage.
Passwords can be changed via so-called insecure protocols without re-
authentication!
Note that when a password is changed via IEC 62056-21 and DLMS, the initial
password is not queried again. This vulnerability enables a potential attacker to
assign a new password without specifying the old password!
It is therefore even more important to protect data communication from third-party
access.
15

Advertisement

Table of Contents
loading

Table of Contents