Security hardening guidelines
Nerve is a third-party platform for which software can be developed. It provides several features and measures that need to be used to ensure security. The following section gives an overview of several product areas or aspects of the product where measures need to be taken by implementers. Note that the measures listed can have major implications for software development processes and functions to ensure the entire system operates according to the security standard.
For ease of use, a summary of all measures can be found in the Security recommendation checklist.
Secure installation
Product aspect | Description & measures |
---|---|
Physical installation |
|
Node Configuration
Product aspect | Description & measures |
---|---|
Configuration of networks | Nerve devices can have multiple networks. In order to minimize the attack surface, users shall configure only those networks which are needed for operation.
|
Acknowledging remote connections | Nerve nodes provide the option to require acknowledgement of remote connections. If this option is not enabled, users with access to remote connections can establish remote connections to the device anytime.
|
Data Services configuration
Product aspect | Description & measures |
---|---|
Data Services gateway | The Data Services gateway is, by design, a component which acts as bridge between protocols. Often, this includes also bridging networks. The gateway should be attached only to those networks where needed, and for all services the highest possible level of authentication and encryption shall be used. Note that quite commonly fieldbus protocols do not use secure transport or authentication. The configurators of the Data Services gateway shall consider this lack of security and take measures accordingly.
|
Workload Configuration
Product aspect | Description & measures |
---|---|
Skilled users for workload configuration | Workload configuration is considered to be of the same complexity as software development.
|
Resource consumption | Nerve provides the capability to reserve resources for a workload. This reduces the probability of interference and therefore the availability of the system.
|
Configuration of remote access | The Nerve remote access feature, per design, permits the traversing of zones. Users shall consider undesired piercing of security zones when configuring remote access.
|
Secure operation guidelines
Product aspect | Description & measures |
---|---|
Following a secure development process | Nerve is a system where customer applications are executed. Developers of customer applications may rely on the security features provided by Nerve. However, they do need to develop their applications in a secure way to achieve an overall secure system. Note that this requirement actually has quite big implications on the application development team and process throughout the whole lifecycle. Even though Nerve comes with a security certification, it does not mean that all applications running on Nerve are secure.
|
Creating a process to act on security information provided by the Nerve team | The Nerve team provides security information to the contact address given to the Nerve team when licenses were purchased.
|
Account management guidelines
Product aspect | Description & measures |
---|---|
Management System | Nerve provides comprehensive, fine-grained access to the Management System. It is important to make use of this system to implement the concept of minimum privilege. This is to be considered especially for the case of workload creation or configuration and creation of remote connections.
|
Local UI | Nerve's local user interface is designed to be used by service engineers with sufficient expertise and security knowledge. Nerve does not provide role-based access control on the local interface. Therefore the local credentials are especially critical.
|
Secure disposal guidelines
Product aspect | Description & measures |
---|---|
Secure disposal | Information may leak after decommissioning the system. For example, decommissioned hardware may be sold and may provide the opportunity to analyze the system and leak data.
|