Emerson v3.1.0 Home Security System User Manual


 
www.emersonprocess.com/deltaV
DeltaV Security Manual October 2014
3.2.4.2 Workstation security templates................................................................................. 48
3.2.4.3 Workstation locking................................................................................................... 48
3.2.4.4 File system................................................................................................................. 48
3.2.4.5 Removable devices .................................................................................................... 49
3.2.4.6 Anti-Virus software..................................................................................................... 49
3.2.4.7 Workstation applications and services ....................................................................... 50
3.2.4.7.1 Disabled services................................................................................................ 50
3.2.4.7.2 Email ................................................................................................................. 52
3.2.4.7.3 Internet Explorer ................................................................................................ 52
3.2.4.8 Workstation Data, Alarms, and Events........................................................................ 53
3.2.4.8.1 Data access ........................................................................................................ 53
3.2.4.8.1.1 Control parameters ................................................................................... 53
3.2.4.8.1.2 Data historians .......................................................................................... 54
3.2.4.9 Portable device security............................................................................................. 54
3.2.5 Controller security.............................................................................................................. 55
3.2.5.1 Physical security ........................................................................................................ 55
3.2.5.2 Connection to the ACN............................................................................................... 56
3.2.5.3 DeltaV Controller I/O protection................................................................................. 56
3.3 DeltaV functional security ......................................................................................................... 56
3.3.1 User security....................................................................................................................... 56
3.3.1.1 Account management................................................................................................ 56
3.3.1.1.1 Centralized management of accounts ................................................................ 57
3.3.1.1.2 Account creation and maintenance .................................................................... 57
3.3.1.1.3 Account expiration ............................................................................................ 58
3.3.1.1.4 Removal of temporary accounts ........................................................................ 59
3.3.1.1.5 Removal of unused accounts ............................................................................. 59
3.3.1.2 Passwords .................................................................................................................. 59
3.3.1.2.1 Composition....................................................................................................... 60
3.3.1.2.2 Default passwords ............................................................................................. 60
3.3.1.2.3 Expiration period................................................................................................ 61
3.3.1.2.4 Expiration prompt.............................................................................................. 61
3.3.1.2.5 Reuse.................................................................................................................. 61
3.3.1.3 Shared accounts.......................................................................................................... 61
3.3.1.4 Installation-generated user accounts.......................................................................... 62
3.3.1.5 Account activity logging ............................................................................................ 62
3.3.1.6 Logging into the DeltaV system.................................................................................. 62
iii