3.13.2.1 Target 66
3.13.2.2 Step 1: Installation setup 67
3.13.2.3 Step 2: Agent settings 67
3.13.2.4 Step 3: Power outage policy settings 67
3.13.3 Restart sequentially the IT equipment on utility recovery 69
3.13.3.1 Target 69
3.13.3.2 Step 1: Installation setup 69
3.13.3.3 Step 2: Power outage policy settings 69
3.14 Resetting username and password 70
4 Securing the Network Management Module ............................................................. 71
4.1 Cybersecurity considerations for electrical distribution systems 71
4.1.1 Purpose 71
4.1.2 Introduction 71
4.1.3 Connectivity—whydoweneedtoaddresscybersecurityforindustrialcontrolsystems(ICS)? 71
4.1.4 Cybersecurity threat vectors 71
4.1.4.1 Paths to the control network 72
4.1.5 Defense in depth 72
4.1.6 Designing for the threat vectors 73
4.1.6.1 Firewalls 73
4.1.6.2 Demilitarized zones (DMZ) 73
4.1.6.3 Intrusion detection and prevention systems (IDPS) 75
4.1.7 Policies, procedures, standards, and guidelines 75
4.1.7.1 Understanding an ICS network 75
4.1.7.2 Log and event management 75
4.1.7.3 Security policy and procedures 76
4.1.7.4 ICS hardening 76
4.1.7.5 Continuous assessment and security training 76
4.1.7.6 Patch management planning and procedures 77
4.1.8 Conclusion 77
4.1.9 Terms and definitions 77
4.1.10 Acronyms 78
4.1.11 References 78
4.2 Cybersecurity recommended secure hardening guidelines 79
4.2.1 Introduction 79
4.2.2 Secure configuration guidelines 79
4.2.2.1 Asset identification and Inventory 79
4.2.2.2 Physical Protection 80
4.2.2.3 Authorization and Access Control 81
4.2.2.4 Deactivate unused features 81
4.2.2.5 Logging and Event Management 82
4.2.2.6 Secure Maintenance 82
4.2.3 References 82
4.3 Configuring user permissions through profiles 83
4.4 Decommissioning the Network Management module 83
5 Servicing the EMP..................................................................................................... 84
5.1 Description and features 84
5.2 Unpacking the EMP 84
5.3 Installing the EMP 84
5.3.1 Mounting the EMP 85
5.3.1.1 Rack mounting with keyhole example 85
5.3.1.2 Rack mounting with tie wraps example 85
5.3.1.3 Wall mounting with screws example 86
5.3.1.4 Wall mounting with nylon fastener example 86
5.3.2 Cabling the first EMP to the device 87
5.3.2.1 Connecting the EMP to the device USB port 87
5.3.3 Daisy chaining 3 EMPs 88
5.3.3.1 Material needed: 88