HFCS 2101 (January 2021)
Total Page:16
File Type:pdf, Size:1020Kb
Cybersecurity Suite HFCS 2101 (January 2021) Patch Compliance Engine (PCE) User Guide CS-HFCSE613en-2101A January 2021 Disclaimer This document contains Honeywell proprietary information. Information contained herein is to be used solely for the purpose submitted, and no part of this document or its contents shall be reproduced, published, or disclosed to a third party without the express permission of Honeywell International Sàrl. While this information is presented in good faith and believed to be accurate, Honeywell disclaims the implied warranties of merchantability and fitness for a purpose and makes no express warranties except as may be stated in its written agreement with and for its customer. In no event is Honeywell liable to anyone for any direct, special, or consequential damages. The information and specifications in this document are subject to change without notice. Copyright 2021 - Honeywell International Sàrl CS-HFCSE613en-2101A 2 Notices Trademarks Experion®, PlantScape®, SafeBrowse®, TotalPlant®, and TDC 3000® are registered trademarks of Honeywell International, Inc. ControlEdge™ is a trademark of Honeywell International, Inc. OneWireless™ is a trademark of Honeywell International, Inc. Other trademarks Trademarks that appear in this document are used only to the benefit of the trademark owner, with no intention of trademark infringement. Third-party licenses This product may contain or be derived from materials, including software, of third parties. The third party materials may be subject to licenses, notices, restrictions and obligations imposed by the licensor. The licenses, notices, restrictions and obligations, if any, may be found in the materials accompanying the product, in the documents or files accompanying such third party materials, or in a file named third_party_ licenses on the media containing the product. Documentation feedback You can find the most up-to-date documents on the Honeywell Process Solutions support website at: http://www.honeywellprocess.com/support If you have comments about Honeywell Process Solutions documentation, send your feedback to: [email protected] Use this email address to provide feedback, or to report errors and omissions in the documentation. For immediate help with a technical problem, contact your local Honeywell Process Solutions Customer Contact Center (CCC) or Honeywell Technical Assistance Center (TAC). CS-HFCSE613en-2101A 3 How to report a security vulnerability For the purpose of submission, a security vulnerability is defined as a software defect or weakness that can be exploited to reduce the operational or security capabilities of the software. Honeywell investigates all reports of security vulnerabilities affecting Honeywell products and services. To report a potential security vulnerability against any Honeywell product, please follow the instructions at: https://honeywell.com/pages/vulnerabilityreporting.aspx Submit the requested information to Honeywell using one of the following methods: Send an email to [email protected]. or Contact your local Honeywell Process Solutions Customer Contact Center (CCC) or Honeywell Technical Assistance Center (TAC) listed in the “Support” section of this document. Support For support, contact your local Honeywell Process Solutions Customer Contact Center (CCC). To find your local CCC visit the website, https://www.honeywellprocess.com/en-US/contact-us/customer- support-contacts/Pages/default.aspx. Training classes Honeywell holds technical training classes that are taught by process control systems experts. For more information about these classes, contact your Honeywell representative, or see http://www.automationcollege.com. CS-HFCSE613en-2101A 4 About this Guide Scope This guide provides step-by-step instructions for collecting data on the VSE and for installing and using the Patch Compliance solution. Intended audience This guide is intended for the following audience types: ● Honeywell Support personnel, who install and deploy the Patch Compliance Engine Software ● Honeywell or customer Support personnel who collect data in the VSE ● System administrators who use the Patch Compliance Engine Software Prerequisite skills For the installation and deployment of the Patch Compliance Engine Software, the guide assumes knowledge of Honeywell Windows Supplemental Product Line. Related documents The following list identifies publications that may contain information relevant to the information in this document. Document Name Document Number Cybersecurity Suite 2003 (March 2020) - VSE CS-HFCS-601en-2003A User Guide CS-HFCSE613en-2101A 5 Revision history Revision Supported Date Description Release B 2101 January 2021 This software is an upgrade- only release from release 2003 A 2009 October 2020 First release CS-HFCSE613en-2101A 6 Contents 1 Security Considerations 10 1.1 Physical security 10 1.2 Secured zone 10 1.3 Limiting access 11 1.3.1 At the VSE level 11 1.3.2 At the directory or file level 11 1.4 Authorization measures 11 2 Terms and Definitions 13 3 Patch Compliance Engine Overview 15 3.1 Patch Compliance Engine architecture 15 3.1.1 Scheduling reports 17 3.1.2 Generating on-demand (instant) reports 18 3.2 Microsoft products supported for Patch Compliance calculation 18 3.3 Entities supported for Patch Compliance calculation 19 4 Requirements 21 4.1 Requirements for data collection 21 4.2 Requirements for the Patch Compliance Engine 21 5 Collecting the Qualification Data at the VSE 22 5.1 Collecting configuration matrix information on Windows machines 23 6 Installing the Patch Compliance solution 24 7 Importing the Qualification Matrix 26 CS-HFCSE613en-2101A 7 7.1 Statuses of patches 29 Appendices 31 Appendix A: Device Categories for Compliance Calculation 32 CS-HFCSE613en-2101A 8 List of Figures Figure 3-1: Patch Compliance Engine architecture 15 Figure 3-2: Scheduled Reports tab 17 Figure 3-3: Generating instant reports 18 Figure 6-1: Pre-Installation Summary page 25 Figure 6-2: Install Complete page 25 Figure 7-1: Qualification matrix Excel file - Summary tab 27 Figure 7-2: Qualification file's Matrix tab 27 Figure 7-3: Uploading the qualification matrix file 28 CS-HFCSE613en-2101A 9 1 Security Considerations 1 Security Considerations This chapter outlines the security measures for the . 1.1 Physical security Caution: HFCS-Patch Compliance Engine is a mission-critical component. Take all necessary physical security measures to prevent attacks or disasters. Ensure that the server where the product is installed is located in an approved physically secure location that is accessible only to authorized personnel. 1.2 Secured zone Patch Compliance Engine contains sensitive information, the loss of which could have severe consequences. Therefore, there is a need to protect the sensitive information and prevent attacks against the product. To do that, the Patch Compliance Engine software, as well as its related extensions, must be installed in an internally secured zone with strict access control lists and appropriate firewall/routing rules. Ensure that Patch Compliance Engine is installed in a directory that is only accessible to authorized personnel responsible for the product. In addition, you must take the following precautions: ● Use a NextGeneration firewall to limit access to the Communication Server to only specific IP addresses (such as the IP address of each VSE), and only through port 443. ● Enable Intrusion/Threat Prevention on this firewall and update the threat signatures at least once a month. ● Ensure that all access to the Communication Server, as well as all other Security Center Components, is protected by this or another, similar firewall. CS-HFCSE613en-2101A 10 1 Security Considerations ● Ensure that the Security Center network is only accessible by trusted, authorized personnel and devices. Caution: If Patch Compliance Engine is installed on one or more servers that are exposed to untrusted networks such as the Internet, protection against denial-of-service (DoS) attacks must be implemented. 1.3 Limiting access It is highly recommended to follow regulatory, industry, and enterprise standards for limiting access to sensitive information as specified below. 1.3.1 At the VSE level The user management at the host running the VSE must follow the principles of need to know and least privilege: Only users who absolutely must have access to the computer are granted access, and these users are assigned the minimal set of permissions allowing them to perform their job. 1.3.2 At the directory or file level Access to directories and files should also be granted in accordance with the principles of need to know and least privilege: Only users who absolutely must have access to the requested directory and file are granted access, and these users are assigned the minimal set of permissions allowing them to perform their jobs. Use the built-in file access audit logging on the OS to monitor unauthorized changes to sensitive files. 1.4 Authorization measures You are strongly advised to implement the following security measures: CS-HFCSE613en-2101A 11 1 Security Considerations ● Change the default administrative password and delete/disable the default service accounts as soon as new administrative accounts are created. ● Disable any default Administrator/Root user on the computer. ● Disable any default Guest user on the computer. ● Disable any unauthenticated access to the computer via shared directories etc. ● Ensure that the OS is up to date with the latest security patches provided by the OS vendor.