Device security capabilities
Your device includes security capabilities that, when combined with other defense-in-depth measures, can help reduce vulnerabilities.
Before you install your device, carefully review the following device security capabilities to understand how you can configure and use the device securely in a protected environment.
Physical |
- Revenue-lock switch
- Anti-tamper sealing points
- LED lock status indicator on the device
- Revenue
lock icon on the display.
|
These capabilities help
prevent unauthorized access to revenue-related parameters and settings
or leave clear evidence that the device has been physically tampered with. |
Information confidentiality |
- SSH, SFTP, HTTPS support, Secure ION, and Secure EtherGate
|
These secure protocols employ cryptographic algorithms,
key sizes, and mechanisms to help prevent unauthorized users from
reading information in transit. |
Access |
- User authentication identifies and authenticates software
processes and devices managing accounts.
- Least privilege in multiple dimensions: read,
peak demand reset, time sync, meter configuration, and security and communications configuration.
- User account lockout limits the number of unsuccessful
login attempts.
- Use control restricts allowed actions to the authorized
use of the control system.
- Supervisors can override user authorizations by deleting user accounts.
- Password strength feedback using ION Setup.
|
These capabilities help enforce authorizations assigned
to users, segregation of duties, and least privilege. |
Device configuration |
- Internal time synchronization.
- Time source integrity protection and meter configuration event
logging.
- Timestamps, including date and time, match the meter clock.
- The device embeds user information when a change is made.
- SSH server hosts an internal SFTP site and stores files in
the meter’s flash memory, such as webpages, COMTRADE records,
and firmware files.
- Settings can be saved as a Security Configuration File (.scf)
using ION Setup.
- Offload information to syslog or a protected storage or retention
location.
|
These capabilities support the analysis of security and user account events
and help protect the device from unauthorized alteration and record configuration
changes. |
Device hardening |
- Least functionality.
- Default port numbers can be changed to lower the
predictability of port use.
- Unused protocols can be disabled to reduce the attack surface of the device.
- Inactivity timeout requires sign in after a time-period of inactivity for webpages, display, and Secure ION protocol.
- Limit the number of consecutive failed login attempts.
|
These capabilities help prohibit and restrict the use
of unnecessary functions, ports, protocols, and services. |
Operation |
- Machine and human-readable reporting options for current device
security settings.
- Audit event logs to identify:
- Meter configuration changes.
- Energy management system events.
- Audit record storage capacity communication to notify a user
when the threshold is approaching.
- Audit storage capacity of 5,000 event logs by default and alternate
methods for log management.
- Time source integrity protection and event logged when changed.
|
These capabilities help provide a method to generate security-related
reports and manage event log storage. |
Maintenance: Upgrade and backup |
- Digitally signed firmware is used to help protect the authenticity of the firmware running on the meter and only allows firmware generated
and signed by the manufacturer.
|
This security capability helps protect the authenticity of the
firmware running on the meter and facilitates protected file transfer.
|
Decommissioning |
- Purge shared memory resources through device wiping and
other decommissioning tasks.
- Physical (recommended) or sustainable device disposal possibilities.
|
These capabilities help prevent the potential disclosure of data when the device is decommissioned. |
For detailed information on the system defense-in-depth assumptions, see System defense-in-depth assumptions.
For detailed information on how to help secure your device in a defense-in-depth protected environment, see Recommended actions.