Eaton Product Secure Configuration Guidelines

Eaton Cybersecurity Center of Excellence

Cybersecurity Recommendations

Documentation to securely deploy and configure Eaton products

Green Motion DC 30/60 has been designed with cybersecurity as an important consideration. A number of features are offered in the product to address cybersecurity risks. These Cybersecurity Recommendations provide information to help users to deploy and maintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity Recommendations are not intended to provide a comprehensive guide to cybersecurity, but rather to complement customers' existing cybersecurity programs.

Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products and solutions, making them more secure, reliable, and competitive for customers. Eaton assures that guidelines and recommendations mentioned in this document are secure.

The following whitepapers are available for more information on general cybersecurity best practices and guidelines:

Intended Use and Deployment Context

Intended Use and Deployment context provides clear understanding of product usage and expected outcomes to customer when used within the context. This also defines the boundaries for authorized usage.

Green Motion DC 30/60 consists of 3 sub-systems such as Power module, DC-SEC, and EV-CSC in addition to switch gear components. Power Module delivers the power as requested by DC-SEC which in turn requested by EV for EV battery charging.

Green Motion DC 30/60 provides following major features:

EV-CSC communicates with the backend or cloud systems towards north side whereas it also communicates with DC-SEC for events, alarms and billing purposes.

Asset Management

Keeping track of software and hardware assets in your environment is a pre-requisite for effectively managing cybersecurity. Eaton recommends that you maintain an asset inventory that uniquely identifies each key component. To facilitate this, Green Motion DC 30/60 supports the following identifying information:

In this guidance document, locations such as Maintenance >>> Firmware refer to individual menu items in the homepage of the webserver run on the device. Please be aware that the visibility of menu items depends on the user profile. For instance, a user belonging to the "Viewer" profile will not be able to access the Settings menu (it will not be even visible).

Identifying information can be obtained using a web browser under:

Maintenance >>> Firmware:

Maintenance >>> System Information:

Communication settings can be obtained from:

Settings >>> Ports:

Settings >>> TCP/IP:

In addition to that, communication related settings can be found at the following locations:

SNMP is not used.

Defense in Depth

Defense in Depth means applying multiple countermeasures for mitigating risks, in a layered or step wise manner. A layered approach to security as shown in the below diagram is what is recommended. Defense in Depth is the responsibility of both the manufacturer and the customer.

Defense in depth layers:

Threats addressed:

Defense in depth layers Threats addressed
Policies and Procedures Compliance violation with various Federal, State, and Industry regulations, Improper usage, Unintentional errors, Phishing
Physical Security Theft, Physical access of the hardware, Disruption, Accidental or intentional errors
Network Security Data leakage, Data spoofing, DoS, DDOS, MITM, Unauthorized remote access, DNS spoofing, HTTPS spoofing, IP spoofing, ARP spoofing, SSL hijacking
Host Security Wi-Fi hacking, Sensitive data leakage, Rootkits, Malwares, Unauthorized access, Malicious upgrades, Unauthorized changes
Application Security Privilege Escalation, Session Hijacking, CSS, CSRF, Buffer Overflows, Remote file inclusion, XML External Entity (XXE), Known Vulnerabilities

Eaton's Defense in depth strategy is discussed in the whitepaper - Cybersecurity considerations for electrical distribution systems[R1].

Policies and Procedures

Policies and procedures tie up the whole security management system. They address people and process part of the security. It also helps organizations to comply with various Federal, State, and Industry regulations.

Eaton recommends using security policies to manage security. Customer should customize policies to suit the specific environment. Policies and procedures increase the level of consistency which saves time, money and resources. The policy should inform the employees about their individual duties and telling them what they can do and what they cannot do with the organization sensitive information.

It helps to educate employees about their importance of responsibility in protecting the organization sensitive data and proper usage. It involves on choosing the right passwords, to providing guidelines for file transfers and data storage which increases employee's overall awareness of security and how it can be strengthened.

Following are some recommended cybersecurity policies but not limited to:

  1. Virus and Malware Protection policy to detect, remove, and repairs the side effects of viruses and malwares risks by using signatures.
  2. Firewall policy to block the unauthorized users from accessing the systems and networks that connect to the Internet and to remove the unwanted sources of network traffic.
  3. Intrusion Detection/Prevention policy to detect and block the network attacks and browser attacks. It also protects applications from vulnerabilities.
  4. Patch management policy to manage and implement patches in a timely fashion based on organizations security profile.
  5. BCP/DR policy to manage any unexpected security events.
  6. Audit Log policy

Sensitive information disclosure:

EV-CSC is designed to store limited data locally (Linux filesystem on the flash memory).

Eaton recommends that sensitive information (i.e., connectivity, log data, personal information) that may be stored by Green Motion DC 30/60 be adequately protected through the deployment of organizational security practices and policies.

It is considered that RFID ID can be treated as potentially sensitive information. Even though it can't be traced to any physical person, extracted ID can be theoretically used for cloning the original RFID (feasibility of such attack depends on the RFID card technology and encryption) and cloned RFID card can be used for "free" EV Charging.

Physical Security

An attacker with unauthorized physical access can cause serious disruption to system/device functionality. Additionally, Industrial Control Protocols do not offer cryptographic protections, making ICS and SCADA communications especially vulnerable to threats to their confidentiality. Physical security is an important layer of defense in such cases. Green Motion DC 30/60 is designed to be deployed and operated in a physically secure location. Following are some best practices that Eaton recommends to physically secure your system/device:

Network Security

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. It complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

Green Motion DC 30/60 supports network communication with other devices in the environment. This capability can present risks if it is not configured securely. Following are Eaton recommended best practices to help secure the network. Additional information about various network protection strategies is available in Eaton Cybersecurity Considerations for Electrical Distribution Systems [R1].

Eaton recommends segmentation of networks into logical enclaves, denying traffic between segments except that which is specifically allowed, and restricting communication to host-to-host paths (for example, using router ACLs and firewall rules). This helps to protect sensitive information and critical services and creates additional barriers in the event of a network perimeter breach. At a minimum, a utility Industrial Control Systems network should be segmented into a three-tiered architecture (as recommended by NIST SP 800-82[R3]) for better security control.

Communication Protection: Green Motion DC 30/60 provides the option to encrypt its network communications. Please ensure that encryption options are enabled. You can secure the product's communication capabilities by taking the following steps:

Green Motion DC 30/60 has been designed with maximum security in mind and therefore the key network security settings have been set in line with the current security requirements, and they are not configurable.

Configuration of local and trusted remote certificates can be done under: Settings >>> Certificate

Eaton recommends opening only those ports that are required for operations and protect the network communication using network protection systems like firewalls and intrusion detection systems / intrusion prevention systems. Use the information below to configure your firewall rules to allow access needed for Green Motion DC 30/60 to operate smoothly.

The following ports are open in the device in the default configuration:

Some ports are configurable using the firewall. To access the firewall, navigate to: Settings >>> Firewall

The firewall allows activate/deactivate individual services (such as http redirect, secure web, etc.) for various interfaces (Ethernet, Wi-Fi, ...). Apart from that, you can change the port number used by that service, and to create a whitelist address filter (follow embedded help for instructions on how to configure it).

SNMP is not used.

For external communication with energy meters, EV-CSC uses Modbus protocol. You can choose either Modbus RTU or Modbus TCP and set the respective settings as desired under: Settings >>> Energy Meters

For SMTP, the respective settings, including the port number, can be found under: Settings >>> General

When the 4G feature of Green Motion DC 30/60 is being used, it is necessary to comply with the following requirements:

In addition to that, the following settings is highly recommended:

Host Security

Strong host security addresses the key aspects of your hosts, including hardware, software, server and storage components. It ensures you are equipped to defend yourself against, and appropriately respond to, cyber-attacks, when they occur.

Account Management

Logical access to the system | device should be restricted to legitimate users, who should be assigned only the privileges necessary to complete their job roles/functions. Some of the following best practices may need to be implemented by incorporating them into the organization's written policies:

User and profiles management

User profiles

Three user profiles are defined in the device:

User settings

The menu item where all the necessary functions are located is: Settings >>> Users

Password/Account/Session management:

Settings >>> Users

Default credentials: admin/admin. The change of the default "admin" password is enforced at the first connection. It is also recommended to change the default "admin" username through the Users page (Settings >>> Users).

Supported authentication methods: LDAP and Radius.

The predefined account (admin) is set by default as "User account never blocks". It is recommended to edit these settings: On Settings >>> Users, Local Users section, click the Edit icon for the admin account to edit the settings. Uncheck the box for "User account never blocks" in Lock account section and click Save. This will result in enforcing the policies related to unsuccessful login attempts and account locking for the "admin" account.

Vulnerability Scanning

It is possible to install and use third-party software with Green Motion DC 30/60. Any known critical or high severity vulnerabilities on third party component/libraries used to run software /applications should be remediated before putting the device | system into production.

Note: Many compliance frameworks and security best practices require a monthly vulnerability review. For many non-COTS products vulnerabilities will be communicated directly through the vendor site.

Malware Defenses

Eaton recommends deploying adequate malware defenses to protect the product or the platforms used to run the Eaton product.

Application Security

Application security is important as applications are most actively used and exposed interface s in a device. This makes applications prime target to attackers.

Green Motion DC 30/60 provides a platform on which customers can customize and host applications according to their requirements. Security vulnerabilities in these applications may expose the underlying device to attack.

Eaton recommends observing best practices for secure system development when customers develop and host an application on the device:

Risk Assessment

Risk assessments are used to identify, estimate, and prioritize risk to organizational operations (i.e., mission, functions, and reputation), organizational assets, individuals, other organizations resulting from the operation and use of information systems.

Eaton recommends conducting a risk assessment to identify and assess foreseeable internal and external risks to the confidentiality, availability, and integrity of the system | device and its environment. This exercise should be conducted in accordance with applicable technical and regulatory frameworks such as IEC 62443 and NERC-CIP. The risk assessment should be repeated periodically.

Customer are recommended to use relevant security tools at the system level to support administration, monitoring and incident handling and security evaluation of the product.

COTS Platform Security

Commercial off the shelf software (COTS) refers to any software pre-built by a third-party vendor and purchased or licensed for use by an enterprise. COTS provide powerful tools at a cost-effective price to meet your company's needs. There are many benefits to using COTS, bringing in untested third-party applications can leave your company open to the same threats as using any untested code. Vulnerabilities in third-party applications or software layers can lead to data loss, denial of service, cross-site-scripting (XSS), SQL Injection and a variety of other attacks by hackers or malicious software.

Eaton recommends that customers harden third-party commercial off-the-shelf (COTS) operating systems or platforms that are used to run Eaton applications / products (e.g., third party hardware, operating systems and hypervisors, such as those made available by Dell, Microsoft, VMware, Cisco, etc.).

Eaton recommends that customers refer to the COTS vendor's documentation for guidance on how to harden these components.

Irrespective of the platform, customers should consider the following best practices:

Time Synchronization

Time synchronization is important as every aspect of managing, securing, planning, and debugging a network involves determining when events happen. Network operations require time-synchronized information to ensure optimal network performance. Time also provides the only frame of reference between all devices on the network.

Many operations in power grids and IT networks heavily depend on precise timing information.

Ensure the system clock is synchronized with an authoritative time source (using manual configuration, NTP, SNTP, or IEEE 1588). Time synchronization can be configured under Settings >>> General, DATE & TIME section

User can select a time zone and sync mode: Dynamic (NTP) / Manual. NTP server can be obtained from DHCP. CSMS server regularly sends heartbeat messages to CSC that contain a timestamp and can be used to sync time as well. If the NTP service is enabled and running, however, OCPP time synchronization is disabled.

Remote Access

Industrial control systems are migrating to new communication technologies. Technologies associated with remote access can often create situations that cause industrial control systems to inherit undesirable security vulnerabilities. Remote access is mostly targeted. Remote access to devices/systems creates another entry point into the network. Strict management and validation of termination of such access is vital for maintaining control over overall security.

Remote access can be configured for LDAP or RADIUS servers. After properly configuring the server, the remote access capabilities and permissions can be configured under Settings >>> Users, LDAP or RADIUS section. Follow embedded help for instructions on how to configure it.

Logging and Event Management

Audit logs are required to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures.

Log files have defined maximum size. If that size is reached a new file is created and the previous one is backed up. The CSC can hold, for each of the logfile types, up to 3 backup versions plus the current version (which is being supplemented by new lines when any logged event occurs). Upon the next file rotation, a new file is created, and the oldest backup file is deleted.

Logging is configured by default and cannot be disabled. Logs can be accessed under MAINTENANCE section:

Secure Maintenance

A system/device needs maintenance to make sure it functions securely and optimally. This involves continuous monitoring processes, perform scheduled reviews and assessing the components periodically and when needed.

Various tools intended to facilitate the activities of maintenance personnel can be found in the device under Maintenance menu item.

Under Maintenance >>> Services, the following tools are available:

Secure Firmware updates

The device purchased may be running on older firmware version. It is recommended to check for latest firmware updates available from Eaton.

Update device firmware prior to commissioning/deploying the device into your environment. Eaton publishes patches and updates for its products to protect them against vulnerabilities that are discovered. Eaton encourages customers to maintain a consistent process to promptly monitor for and install new firmware updates.

There are few processes involved in the FW update:

Please check Eaton's cybersecurity website for information bulletins about available firmware and software updates.

Business Continuity / Cybersecurity Disaster Recovery

The BCP coordinates efforts across the organization and uses the disaster recovery plan to restore hardware, applications and data deemed essential for business continuity. BCP's are unique to each organization as they describe how the organization will continue business in an emergency situation.

Plan for Business Continuity / Cybersecurity Disaster Recovery

Eaton recommends incorporating Green Motion DC 30/60 into the organization's business continuity and disaster recovery plans. Organizations should establish a Business Continuity Plan and a Disaster Recovery Plan and should periodically review and, where possible, exercise these plans. As part of the plan, important system | device data should be backed up and securely stored, including:

The Save Reset Restore (SRR) feature is available in the Green Motion DC 30/60. The last step in the configuration in the user interface allows the user to export configuration. At the same time, when the user starts to configure the Green Motion DC 30/60, there is the option to upload the saved configuration.

Secure Operations Guidance

Operations Guidance contributes to demonstrate that appropriate and proportionate measures have been taken to control cyber security risks. It helps users to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.

Eaton recommends that end user should follow the recommended practices in the above sections for secure operations of the product. Following points are also recommended -

Vulnerability Disclosure

Eaton recommends reporting all cybersecurity incident and vulnerabilities. Eaton has an incident response process to handle reported incidents/vulnerabilities. The incident response process helps in determining fix/mitigations and communicate advisory to customer in time. Link below should be used for reporting cybersecurity incident and vulnerabilities: https://www.eaton.com/us/en-us/company/news-insights/cybersecurity/vulnerabilitydisclosure.html

Product Integration

The purpose of Product Integration (PI) guideline is to deploy components, ensure that the product, as integrated, behaves properly and deliver the product.

Eaton recommends following the installation and user manuals provided with the product for deployment and integration of the product in its intended environment.

It is also recommended to end user to follow guidelines provided in Part 3 – Defense in Depth during integration of product for the following for a secure product integration:

Product is delivered in the integrated and tested form to the customer. Following documents are provided to the customer and relevant personnel for different purposes: Installation Manual, Service Manual, User Manual.

Decommissioning or Zeroization

It is a best practice to purge data before disposing of any device containing data. Guidelines for decommissioning are provided in NIST SP 800-88. Eaton recommends that products containing embedded flash memory be securely destroyed to ensure data is unrecoverable.

Embedded Flash Memory on Boards and Devices

The figure below illustrates the sanitization and disposition decision flow:

Figure 1: Sanitization and disposition decision flow

A diagram shows a decision tree for sanitization and disposition based on security categorization (Low, Moderate, High), leaving organization control, and media reuse.

References

Models: DC30, DC60, DC30 DC60 Green Motion Duo, DC30 DC60, Green Motion Duo, Motion Duo, Duo

File Info : application/pdf, 12 Pages, 863.87KB

PDF preview unavailable. Download the PDF instead.

eaton-green-motion-dc30-60-cybersecurity-guidelines-en-us

References

Adobe PDF Library 17.0 Adobe InDesign 20.4 (Windows)

Related Documents

Preview Eaton PDU Network Module Secure Configuration Guidelines
Comprehensive guidelines for securely deploying and configuring the Eaton PDU Network module, covering asset management, risk assessment, physical and account security, session management, network security, and maintenance.
Preview Eaton Halo MSLED600 Series Solar Powered Motion Activated LED Outdoor Security Light
Discover the Eaton Halo MSLED600 Series, a solar-powered LED outdoor security light offering 650 lumens and 180-degree motion detection. Features durable construction, a replaceable battery, and easy installation for wall or eave mounting. Available in bronze and white.
Preview Eaton Vulnerability Advisory ETN-VA-2025-1002 for G4 PDU
Eaton addresses multiple security vulnerabilities in the G4 PDU firmware (ETN-VA-2025-1002), providing details on CVE-2025-48393 and CVE-2025-48394, remediation steps, and general security best practices.
Preview Eaton VisionGuard Operating Instructions
Comprehensive operating instructions for Eaton VisionGuard software, detailing installation, configuration, and usage for DualGuard-S and ZB-S emergency lighting systems.
Preview Eaton Green Motion Home & Building EV Charger Floor-Mounted Column Installation Guide
This document provides technical specifications and installation instructions for the Eaton Green Motion Home and Green Motion Building single and double EV charger floor-mounted columns. It details the necessary tools, materials, and mounting steps for a secure and proper installation.
Preview Eaton UPS and Connectivity Compatibility List for Intelligent Power Manager
A comprehensive compatibility list detailing which Eaton UPS models and connectivity options are supported by Eaton Intelligent Power Manager (IPM) and related software. Includes compatibility for hardware monitoring, management, and supervision.
Preview PXG 900 User's Guide: Configuring and Operating the Power Xpert Gateway
This user's guide provides comprehensive instructions for configuring and operating the Eaton Power Xpert Gateway 900 (PXG 900). Learn how to connect the device, manage network settings, configure device communications, set alarms, and enhance cybersecurity.
Preview Eaton Network-M3 Gigabit Network Card Installation Manual
This manual provides instructions for installing and configuring the Eaton Network-M3 Gigabit Network Card for UPS systems. It covers unboxing, mounting, accessing the web interface via network or USB, IP address configuration, and an overview of the web interface menus.