Workstation 6 Series

Workstation 6 Series

Oracle® Hospitality Workstation 6 Series Security Guide Release 1.0 E73830-04 March 2020 Oracle Hospitality Workstation 6 Series 19TSecurity Guide Release 1.0 E73830-04 Copyright © 2015, 2020, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Contents 3 Preface 4 1 Workstation 6 Series Security Overview 1-1 Basic Security Considerations 1-1 Overview of Workstation 6 Series Security 1-1 Understanding the Workstation 6 Series Environment 1-5 Physical Security 1-5 Factory UEFI Firmware Settings 1-5 Factory Microsoft Windows Installation Settings 1-6 Factory Recovery 1-7 Factory Intel ME/AMT Configuration (650 Configuration Only) 1-7 2 Performing a Secure Workstation 6 Series Installation 2-1 Pre-Installation Security 2-1 Installing Workstation 6 Series Securely 2-1 3 Implementing Workstation 6 Series Security 3-1 Physical Security 3-1 UEFI Firmware Security 3-1 Operating System Security 3-2 Intel Active Management Technology (Model 650 only) 3-3 4 Secure Deployment Checklist 4-1 iii Preface Audience This document is intended for those who set up, install, and operate the Oracle MICROS Workstation 6 Series, which includes the 610, 620, 625E, 625X, 650, and 655X configurations. It is not specific to a particular software application. Customer Support To contact Oracle Customer Support, access My Oracle Support at the following URL: https://support.oracle.com When contacting Customer Support, please provide the following: • Product version and program/module name • Functional and technical description of the problem (include business impact) • Detailed step-by-step instructions to recreate • Exact error message received • Screenshots of each step you take Documentation Oracle Hospitality product documentation is available on the Oracle Help Center at http://docs.oracle.com/en/industries/food-beverage/ Table 1-1 Revision History Date Description April 2016 Initial publication. July 2016 Updated to include details for the Workstation 610 with Microsoft Windows 10. November 2016 Added information for the Workstation 610 configuration with Microsoft Windows 8.1 and a 64GB SSD. March 2017 Added information for the Workstation 620 and Workstation 650 configurations without MSR. October 2018 Added Merchant Link compatibility information. March 2020 Added Oracle Linux security information and new Workstation 6 Series models. iv 1 Workstation 6 Series Security Overview This chapter provides an overview of Workstation 6 Series security features and explains general device security principles. Basic Security Considerations The following principles are fundamental to using any hardware or software securely: • Keep software up to date. This includes software and drivers specific to the product as well as the latest patches available from 3rd party vendors. • Limit account privileges as much as possible. Users should only be given the access necessary to perform their work. User privileges should be reviewed periodically to determine relevance to current work requirements. • Install software securely. For example, use firewalls, secure protocols using TLS (SSL), and secure passwords. See Performing a Secure Workstation 6 Series Installation for more information. • Monitor system activity. Establish who should access which system components, and how often, and monitor those components. • Learn about and use the Workstation 6 Series security features. See Implementing Workstation 6 Series Security for more information. • Use secure development practices. For example, take advantage of existing database security functionality instead of creating your own application security. • Keep up to date on security information. Oracle regularly issues security-related patch updates and security alerts. You must install all security patches as soon as possible. See the Oracle Critical Patch Updates and Security Alerts web site: http://www.oracle.com/technetwork/topics/security/alerts-086861.html Overview of Workstation 6 Series Security The Workstation 6 Series point of sale terminals are ruggedized devices that incorporate a mixture of hardware and software components commonly found in PC-based devices. For peripherals connectivity, both industry standard and Oracle MICROS proprietary ports have been integrated on-board. There are six hardware configurations available: 610, 620, 625E, 625X, 650, and 655X 1-1 Chapter 1 Workstation 6 Series Security Overview Table 1-1 Workstation 610/620/650 Hardware Component Overview Feature 610 620 650 Processor Intel Atom E3827 Dual-Core Intel Celeron 3765U Dual-Core Intel i5-5350U processor with 1.75GHz clock Processor with 1.9GHz clock speed Dual-Core speed Processor with 1.8GHz base and 2.9GHz Turbo maximum clock speed TPM Atmel AT97SC3204 Intel Broadwell fTPM (TCG 1.2 Compliant) (TCG 2.0 compliant) Storage 32 GB or 64 GB MO-297 Slim 128 GB M.2 SATA 3.0 Solid State 256 GB M.2 SATA 2.0 Solid State Drive Drive standard SATA 3.0 Solid standard State Drive SD Card Socket standard Magnetic Stripe . Modular Integrated 3-Track Two configurations available: Reader (MSR) Magnetic Stripe Reader; • With Modular Integrated 3-Track Magnetic Stripe Capable of Hardware Reader; Capable of Hardware Encryption at the Swipe Encryption at the Swipe. • Triple Data Encryption (TDES/3DES or AES algorithm . Triple Data Encryption (TDES/3DES or AES • Derived Unique Key per Transaction (DUKPT) key algorithm rotation algorithm . Derived Unique Key per • Merchant Link encryption key pre-injected Transaction (DUKPT) key • Without Modular Integrated 3-Track Magnetic Stripe rotation algorithm Reader . Merchant Link encryption key pre-injected. Network 10/100/1G RJ45 Ethernet 802.11 a/b/g/n Dual Band Radio w/Bluetooth 4.0 (Optional) USB 9 Total: 10 Total: • 2 High Speed USB on I/O Panel • 2 High Speed USB on I/O Panel • 1 High Speed USB in Stand • 1 High Speed USB in Stand • 2 USB 2.0 on I/O Panel • 2 USB 2.0 on I/O Panel • 1 USB 2.0 12V Powered Header • 1 USB 2.0 12V/1A Powered Header on I/O Panel on I/O Panel • 3 USB 2.0 Internal • 3 USB 2.0 Internal • 1 Industry Standard 24V/2A Powered USB on I/O Panel Serial Ports 4 Total Standard: 3 Total Standard: • 2 - RJ45 RS232 Powered • 1 - RJ45 RS232 Powered (0/5/9/12V Powered) (0/5/9/12V Selectable) • 1 - RJ45 RS232 • 1 - RJ45 RS232 • 1 - RJ45

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us