Instructions for MOXA models including: AIG-302 Series Industrial IoT Gateways, AIG-302 Series, Industrial IoT Gateways, IoT Gateways, Gateways

The Security Hardening Guide for the AIG-302 Series

Moxa Moxa Inc.

The Security Hardening Guide for the AIG-302 Series

Jun 4, 2024 — Go to Security > Firewall and check the allow list. Application. Resource ... You can View, Create, Edit, Deactivate, and Delete user accounts. In the ...

AIG-302 系列 - 可编程 IIoT 网关 | MOXA

Скачать

MOXA AIG-302-T-EU-AZU-LX | Встраиваемые компьютеры На DIN-рейку


File Info : application/pdf, 17 Pages, 1.06MB

PDF preview unavailable. Download the PDF instead.

moxa-the-security-hardening-guide-for-the-aig-302-series-tech-note-v1 01
The Security Hardening Guide for the AIG-302 Series
Moxa Technical Support Team support@moxa.com

Contents

1 Introduction .............................................................................................................. 2

2 General System Information ..................................................................................... 2

2.1 Basic Information About the Device................................................................ 2 2.2 Physical Security Measures............................................................................. 2 2.3 Anti-tamper Features...................................................................................... 2

2.4 Usage Limitations ........................................................................................... 2 2.5 Network Security ............................................................................................ 2 3 Configuration and Hardening Information................................................................. 3

3.1 TCP/UDP Port Status and Suggested Settings ................................................ 3 3.2 Forcing a Password Change After First Login .................................................. 3 3.3 Security Dashboard......................................................................................... 4
3.3.1 Account Settings................................................................................ 6 3.3.2 Application Networking ..................................................................... 7 3.3.3 Application Resource Usage............................................................... 8

3.3.4 Product Certificate Deployment ......................................................... 9

3.3.5 Service Setting ................................................................................ 11

3.3.6 System Status Check ....................................................................... 13

3.4 Account Management.................................................................................... 14 3.4.1 Accounts .......................................................................................... 14

3.4.2 3.4.3

Roles ............................................................................................... 15 Password Policy............................................................................... 17

Copyright © 2024 Moxa Inc.

Released on Jun 4, 2024

About Moxa Moxa is a leading provider of edge connectivity, industrial computing, and network infrastructure solutions for enabling connectivity for the Industrial Internet of Things. With 35 years of industry experience, Moxa has connected more than 82 million devices worldwide and has a distribution and service network that reaches customers in more than 80 countries. Moxa delivers lasting business value by empowering industry with reliable networks and sincere service for industrial communications infrastructures. Information about Moxa's solutions is available at www.moxa.com.

How to Contact Moxa

Tel: 1-714-528-6777 Fax: 1-714-528-6778

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

1 Introduction
This document provides guidelines on how to configure and secure the AIG-302 Series. You should consider the recommendations in this document as best practices for securing the AIG-302 in most applications. It is highly recommended that you review and test the configurations thoroughly before implementing them in your production system to ensure that your applications are not negatively impacted.

2 General System Information

2.1

Basic Information About the Device

Model AIG-302

Operating System Linux Debian 11

Firmware v1.0

2.2

Physical Security Measures
The AIG-302 should be safeguarded with physical security measures such as CCTV surveillance, security guards, protective barriers, locks, access control, and perimeter intrusion detection. The appropriate type of physical security should be determined based on the environment and the level of risk of physical attacks.

2.3

Anti-tamper Features
· The AIG-302 is equipped with anti-tamper labels on its enclosures, enabling the administrator to detect any tampering with the device.
· Additionally, security screws are used on the enclosures as a physical tamperresistance measure, enhancing the difficulty of accessing the internal components in the event of a physical security breach.

2.4

Usage Limitations
The AIG-302 should not be utilized to control mission-critical components. Failure to maintain control of such a device could pose threats to human safety, the environment, or lead to significant financial losses.

2.5

Network Security
· If the AIG-302 needs to be connected to an untrusted network (e.g., Internet) through Ethernet or Wi-Fi, we recommend avoiding direct connections to the network. Set up a firewall between the Ethernet and Wi-Fi connections of the AIG-302 and the untrusted network.
· For security-critical applications, it is highly recommended to use a private APN for cellular networks.

Copyright © 2024 Moxa Inc.

Page 2 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3 Configuration and Hardening Information

3.1

TCP/UDP Port Status and Suggested Settings

For security reasons, consider disabling unused services and use a higher security level for data-communication services. Refer to the table below for recommended settings.

Process Name

Suggested

Port

Type

Description

Settings

Number

SSH Server Enable

TCP 22

SSH console

HTTP Service
HTTPS Service

Disable Enable

Discovery Service

Disable

Modbus Disable
TCP Server

DHCP Server

Disable

TCP 80

Web console

TCP 8443 UDP 5353 TCP 502 UDP 67, 68

Secured web console
For communicating with Moxa utilities
For Modbus communication
For assigning a system IP to DHCP clients

Security Remark
Encrypted data channel with trusted certificate Disable HTTP service for transmissions involving plain text Encrypted data channel with trusted certificate
Disable the service if it is not in use
Disable service if it is not in use
Disable service if it is not in use

3.2

Forcing a Password Change After First Login
For security reasons, account and password protection is enabled by default. Users must provide the correct user account and password to unlock the device to gain access to the web console of the gateway.
The default account and password are admin and admin@123 (both in lowercase letters), respectively.

Copyright © 2024 Moxa Inc.

Page 3 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

After the first login, we force a password change to comply with general security policies and practices and to enhance the security of your device.

3.3

Security Dashboard
Once device provisioning is completed, you can log in into the AIG web console, go to Security Dashboard, and press Scan to check the security status of the device.

You can utilize the Security Dashboard results to fix security issues to enhance the security of your AIG gateway as per the following guidelines:

Category
Account Settings
Application Networking
Application Resource Usage
Product Certificate Deployment

Security Check Criteria Password should be changed within the preset interval. An account should only have one active session at any given time. An account should not have abnormal connections (E.g., more than one session per account from different source IPs). System should not have open network ports. IoT Edge modules should not utilize system disk's configurable space. IoT Edge modules should not utilize system disk's non-configurable space.
IoT Edge modules should not be granted direct privileges.
Production certificate should be configured as an Azure IoT Edge downstream certificate.

Threat Mitigation/handling Go to Account Management > Accounts to change the password.
Go to Security > Session Management monitor and manage concurrent sessions.
Go to Security > Firewall and check the allow list.
Ensure the IoT Edge modules are deployed in the system storage paths /var/run/ and /tmp/.
To grant permissions to the IoT Edge modules, go to Cloud Connectivity > Azure IoT Edge > Module Permission, create a service account, and grant the required permissions to the IoT Edge module. For enhanced security robustness, we recommend using your own certificate instead of the default

Copyright © 2024 Moxa Inc.

Page 4 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

Category Security Check Criteria

Threat Mitigation/handling

one. Go to Cloud Connectivity > Azure IoT Edge > Downstream Certificate to upload a certificate.

Azure IoT Edge should not use a connection string for provisioning.

For enhanced security robustness, we recommend using a TPM or a X.509 certificate.

All certificates should not expire within the next three months.
All certificates should have expired.

Go to Security > Certificate Center to check the status of each certificate. If you find that a certificate will expire soon or has already expired, go to Cloud Connectivity > Azure IoT Edge/Azure IoT Device/MQTT Client or Security > HTTPS to check and replace the certificates.

Discovery Service should not be enabled.

Go to Maintenance > Service to disable Discovery Service.

Go to Maintenance > Service to SSH Service should not be enabled.
disable the Debug Mode.

Service Settings

Serial Console Service should not be Go to Security > Service to

enabled.

disable local console.

Account Lock Service should be enabled.

Go to Security > Login Lockout to enable the Login Failure Lockout option.

System Use Notification Service should be enabled.

Go to Security > System Use Notification to enable System Use Notification Service.

Product software package should be

System

up to date.

Status Check

System backup should be

performed at least once a year.

Go to Maintenance > Software Upgrade and click Check for Upgrade to retrieve the latest upgrade pack information.
Go to Maintenance > Backup & Restore and click Manage to back up the system.

Copyright © 2024 Moxa Inc.

Page 5 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.1 Account Settings
· Security Check Criteria: Password should be changed within the preset interval. Go to Account Management > Accounts to change the password. We recommend changing the password within the preset interval.

To configure a preset interval for changing the password, go to Account Managements > Password Policy > Reminder Threshold.
· Security Check Criteria: An account should have only one active session at any given time.
Go to Security > Session Management to identify and manage accounts with more than one session. We recommend deleting connections that you are unaware of, especially in cases where an account has more than one active session.

· An account should not have abnormal connections.
Go to Security > Session Management to identify and manage abnormal sessions, such as more than one session per account from different source IPs. We recommend deleting the connections of which you are not aware.

Copyright © 2024 Moxa Inc.

Page 6 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.2 Application Networking
Security Check Criteria: System should not have open network ports.
Understanding which network ports are open is crucial for improving security, preventing vulnerabilities, safeguarding data, staying compliant, and optimizing system resources. We advise minimizing open network ports to reduce cybersecurity risks. To check for open ports in the system, navigate to Security > Firewall. If there are open ports that are not in use, we strongly recommend disabling them. For the essential open ports, we recommend adding rules to limit access.

Copyright © 2024 Moxa Inc.

Page 7 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.3 Application Resource Usage
· Security Check Criteria: IoT Edge modules should not utilize system disk's configurable space.
Our recommendation is for the IoT Edge modules to be deployed only in specific system storage directories/paths such as /var/run/ and /tmp/.
· Security Check Criteria: IoT Edge modules should not utilize system disk's nonconfigurable space.
Our recommendation is for the IoT Edge modules to be deployed only in specific system storage directories/paths such as /var/run/ and /tmp/.
· Security Check Criteria: IoT Edge modules should not granted direct privileges.
Granting permissions to IoT Edge modules in a controlled manner is important for cybersecurity because it reduces the risk of unauthorized access, protects sensitive data, and ensures that each module has access only to what it needs to function properly. To grant permissions to IoT Edges, go to Cloud Connectivity > Azure IoT Edge > Module Permission, create a service account, and grant permission to the IoT Edge module.

Copyright © 2024 Moxa Inc.

Page 8 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.4 Product Certificate Deployment
· Security Check Criteria: Production Certificate should be configured as an Azure IoT Edge downstream certificate.
For enhanced security robustness, we recommend using your own certificate instead of the default one. Go to Cloud Connectivity > Azure IoT Edge > Downstream Certificate to upload a certificate.

· Security Check Criteria: Azure IoT Edge should not use connection string for provisioning.
We recommend an attestation method, which uses a TPM or a X.509 certificate, instead of a manual confirmation using a connection string. You can configure this at Cloud Connectivity > Provisioning Settings > DPS.

Copyright © 2024 Moxa Inc.

Page 9 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

· Security Check Criteria: All certificates should not expire within the next three months.
You can check the status of all the certificates being used by the AIG at Security > Certificate Center. We recommend regular inspection of the status of the certificates and importing new certificates to replace the ones that are about to expire.

· Security Check Criteria: All certificates should not have expired.
You can check the status of all the certificates being used by the AIG at Security > Certificate Center. We recommend regular inspection of the status of the certificates and importing new certificates to replace the ones that are about to expire.

Copyright © 2024 Moxa Inc.

Page 10 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.5 Service Setting
· Security Check Criteria: Discovery Service should not be enabled. We recommend disabling the Discovery Service in the commissioning stage. Go to Maintenance > Service to disable the service.

· Security Check Criteria: SSH Service should not be enabled.
We recommend disabling the SSH Service in the commissioning stage. Go to Maintenance > Service to disable Debug Mode.

· Security Check Criteria: Serial Console Service should not be enabled.
We recommend disabling Serial Console Service in commissioning stage. Go to Maintenance > Service to disable the Local Console.

Copyright © 2024 Moxa Inc.

Page 11 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

· Security Check Criteria: Account Lock Service should be enabled.
To thwart brute-force attacks, we recommend activating the Account Lock Service. When AIG detects multiple failed login attempts surpassing the set threshold, it will automatically lock the account for the specified duration. Go to Security > Login Lockout to enable and configure parameters for this service.

· Security Check Criteria: System Use Notification Service should be enabled.
It is important to display system usage notifications prior to the login page so users know the rules and risks involved in using the system. This helps meet legal requirements, reduces risks, and holds users accountable for their actions.
Go to Security > System Usage Notification to enable this function.

Copyright © 2024 Moxa Inc.

Page 12 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.3.6 System Status Check
· Security Check Criteria: Product software package should be up to date.
The importance of security cannot be overstated when it comes to keeping your product software up to date. Regular updates help patch vulnerabilities, reduce the risk of cyberattacks, and protect sensitive data, safeguarding your system and users from potential security threats. Go to Maintenance > Software Upgrades to retrieve up-to-date software for your AIG.

· Security Check Criteria: System backup should be performed at least once a year.
Performing a system backup annually is important to protect your data in case of system failures, cyberattacks, or disasters. It ensures you can quickly recover your information, stay compliant with regulations, and maintain business continuity. Go to Maintenance > Backup & Restore to back up your system.

Copyright © 2024 Moxa Inc.

Page 13 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

3.4

Account Management
You can maintain user accounts and assign a role with specific permissions to each account. These functions allow you to track and control the access to the device.

3.4.1 Accounts
You can View, Create, Edit, Deactivate, and Delete user accounts. In the main menu, go to Account Management > Accounts to manage user accounts.

Creating a New User Account
Click + Create to create a new user account. In the dialogue box that is displayed, fill in the fields and click SAVE.

Note

To comply with security policy and best practices, specify a strong password that is at least eight characters long, consisting of at least one number and at least one special character.

Password Policy

Valid Password

Copyright © 2024 Moxa Inc.

Page 14 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

Managing Existing User Accounts To manage an account, click on the pop-up menu icon for the account.

Function Edit Deactivate
Delete

Description Change the role, email, or password of an existing account Does not allow the user to log in to the device Delete the user account (NOTE: This operation is irreversible.)

Note

You cannot Deactivate or Delete the last remaining account with an Administrator role. This is to prevent an unauthorized account from fully managing the system. When the system detects only one active account when selecting the Administrator role, all items in the pop-up menu are grayed out.

3.4.2 Roles
You can View, Create, Edit, and Delete user roles for your AIG device here.

Click + Create to set up a new user role. Specify a unique name for the role and assign the appropriate permissions and click Save to create the role in the system.

Copyright © 2024 Moxa Inc.

Page 15 of 17

Moxa Tech Note

The Security Hardening Guide for the AIG-302 Series

You can edit the settings or delete an existing role by clicking on the pop-up menu icon next to the role.
When the role has been set up, it is available for selection by accounts.

Copyright © 2024 Moxa Inc.

Page 16 of 17

Moxa Tech Note
3.4.3 Password Policy

The Security Hardening Guide for the AIG-302 Series

Parameter Min. Password Length Password Strength Policy Password Change Reminders

Value 8 to 256
10 to 360 days

Description The minimum password length To define how the AIG checks the password strength
Notify user to change the password

Copyright © 2024 Moxa Inc.

Page 17 of 17



References

Moxa Adobe PDF Library 24.2.23