
Table of contents
Section 1 Introduction.......................................................................3
This manual........................................................................................ 3
Intended audience.............................................................................. 3
Product documentation.......................................................................4
Product documentation set............................................................4
Document revision history............................................................. 4
Related documentation..................................................................4
Symbols and conventions...................................................................4
Symbols.........................................................................................4
Document conventions.................................................................. 5
Section 2 Security in distribution automation................................... 7
General security in distribution automation........................................ 7
Section 3 Secure system setup........................................................9
Basic system hardening rules.............................................................9
Relay communication interfaces.......................................................10
TCP/IP based protocols and used IP ports...................................... 11
Secure communication..................................................................... 12
Certificate handling......................................................................12
Encryption algorithms.................................................................. 12
Section 4 User management..........................................................15
Local user account management..................................................... 15
Password policies.............................................................................17
Section 5 Security logging..............................................................19
Audit trail...........................................................................................19
Section 6 Using local HMI.............................................................. 21
Logging in......................................................................................... 21
Logging in via USB port...............................................................22
Logging out.......................................................................................23
Section 7 Protection of relay and system configuration................. 25
Backup files...................................................................................... 25
Creating a backup from the relay configuration...........................25
Creating a backup from the PCM600 project.............................. 25
Restoring factory settings................................................................. 26
Restoring the administrator password.............................................. 26
Table of contents
REX610 1
Cyber Security Deployment Guideline