Communication Interface Exposure & Cybersecurity Controls

Product Name: EURO 76

Part code(s): EURO76/S-UK, EURO76/L-UK and applicable kits.

Manufacturer: Pyronix Ltd. Secure House, Braithwell Way, Hellaby, Rotherham, S66 8QY

1. Purpose of This Section

This section outlines the physical and logical communication interfaces of the EURO 76 in accordance with the requirements of:

The information supports the risk assessment and demonstrates that no interfaces are unintentionally exposed in a way that would compromise network performance, personal data, or privacy.

2. Interface Capability Summary

The EURO 76 contains or supports the following communication interfaces:

Interface Present by Default Enabled by Default Requires Auth to Enable User Removable Hardware Use Case
Wi-Fi No No Yes Yes App comms via cloud/ARC comms
4G No No Yes Yes App comms via cloud/ARC comms
GPRS No No Yes Yes App comms via cloud/ARC comms
Ethernet No No Yes Yes App comms via cloud/ARC comms

3. Optional Interfaces (User-Installed Modules)

4.1 Wi-Fi

4.2 Cellular

4.3 Ethernet

5. Disabled or Inactive Interfaces

No interfaces are enabled unless explicitly activated by an authenticated user. Hardware interfaces (Wi-Fi, Cellular, Ethernet) are not active unless installed. No undocumented or hidden interfaces are present.

6. Risk Mitigation Summary (EN 18031 Decision Compliance)

The table summarises the compliance status of the EURO 76 against each section of the EN 18031 standard with a Pass or Fail designation. This overview highlights the key evaluation criteria met by the product. Detailed decision trees and full compliance documentation can be provided upon request for comprehensive technical review.

EN 18031 Section Pass/Fail Description
ACM (Access Control Mechanism) Governs the policies and mechanisms controlling user and system access rights to protect against unauthorised access.
AUM (Authentication Mechanism) Specifies authentication requirements for network and user interfaces, including password policies, authenticator validation, change management, and brute force protection.
SUM (Security Update Mechanism) Ensures the device supports secure software updates with integrity and authenticity verification, including options for automated or user-approved installations.
SSM (Secure Software Mechanism) N/A Requires secure storage of sensitive and network-related data persistently stored on the device to protect against unauthorised access or tampering.
SCM (Secure Communication Mechanism) Requires secure communication protocols with integrity, authenticity, confidentiality, and replay protection to safeguard data transmission.
RLM (Resilience Mechanism) Ensures devices can mitigate and recover from Denial of Service (DoS) attacks and other failures affecting network interfaces.
NMM (Network Monitoring Mechanism) For network devices, mandates monitoring of network traffic to detect anomalies such as DoS attacks.
TCM (Traffic Control Management) For network devices, requires mechanisms to control and prioritise network traffic to prevent overload or delays.
CCK (Confidential Cryptographic Keys) Specifies secure generation, storage, and uniqueness of cryptographic keys with minimum security strength standards.
GEC (General Engineering Controls) Tracks hardware/software components and known vulnerabilities; ensures re-mediation or acceptance.
CRY (Cryptography) Requires the use of recommended, secure cryptographic algorithms and practices to protect secure and network assets.

7. Supporting Documents & References

EURO 76 Declaration of Conformity - view here

EURO 76 EN 18031-1 Decision Tree Reference Guides:

Author: Daniel Mills

Position: Technical Product Marketer

Date: 31/07/25

Document reference: RED-002

Revision: 01

Approved by: John Walker

Position: Compliance Engineer

Signature:

PDF preview unavailable. Download the PDF instead.

red002-01-ciecc-statement-euro-76 Adobe PDF Library 17.0

Related Documents

Preview Pyronix PCX 78 Communication Interface Exposure & Cybersecurity Controls
This document details the communication interface exposure and cybersecurity controls for the Pyronix PCX 78, outlining its compliance with EU directives and EN 18031 standards. It covers Wi-Fi, 4G, GPRS, and Ethernet interfaces, including their security measures, purpose, and risk exposure.
Preview Pyronix Enforcer V11 Communication Interface Exposure & Cybersecurity Controls
This document details the communication interface exposure and cybersecurity controls for the Pyronix Enforcer V11, outlining its compliance with relevant EU directives and standards like EN 18031.
Preview Pyronix EU Declaration of Conformity for Alarm System Components
Official EU Declaration of Conformity from Pyronix Limited for various alarm system input panels and components, detailing compliance with EMC, LVD, RoHS, and R&TTE directives.
Preview Pyronix Enforcer X280 ENFX-280H/L EU Certificate of Conformity
Official EU Certificate of Conformity for the Pyronix Enforcer X280 ENFX-280H/L security system, detailing compliance with EMC, RED, LVD, and RoHS directives and relevant harmonised standards.
Preview Pyronix Enforcer X280 EU Declaration of Conformity
Official EU Declaration of Conformity for the Pyronix Enforcer X280 alarm system, detailing compliance with EU directives and standards for safety and electromagnetic compatibility.
Preview Pyronix ENFORCER Modem and Communications Guide
This guide details the various modem and communication modules available for the Pyronix ENFORCER alarm system. It provides essential setup, programming, and diagnostic information for modules such as Wi-Fi, LAN, GPRS+SIM, PSTN, and GSM. Learn how to integrate your system with networks, the Pyronix cloud platform, and Alarm Receiving Centres (ARCs) to enhance security and enable remote access via the HomeControl+ application.
Preview Android Tablet User Guide: Setup, Features, and Operation
Explore the features and functionalities of your Android Tablet with this comprehensive user guide. Learn about setup, device operation, communication, connectivity, security, and maintenance.
Preview Enforcer V11 EN18031-1 Decision Tree Reference Guide
A comprehensive reference guide detailing the EN18031-1 decision trees for the Enforcer V11, covering access control, authentication, secure updates, storage, communication, resilience, network monitoring, traffic control, and cryptography.