Cybersecurity
NOTE: The following is a high-level overview of Energy Hub cybersecurity aspects. It shows the key components that make up Energy Hub. For detailed cybersecurity information, refer to the component documentation.
Energy Hub is an energy information system. It provides measurement data and alarm data for display, trending, and reporting. As with any kind of information system, it is important to consider information privacy, information integrity, and system integrity. Below is a system diagram for Energy Hub:
Cybersecurity information related to Energy Hub:
Area | Feature | Details |
---|---|---|
1 | Energy Hub user access |
A user in Energy Hub is a logical entity that provides access to the system. It controls what a person can do and which data they can access. Unauthorized access to Energy Hub could compromise the system integrity and data accuracy, and it could disclose sensitive information, such as operational or facility details. To reduce cybersecurity risks:
NOTE: Energy Hub automatically ends inactive web app sessions after 10 minutes. Before the session is ended, you are reminded of the timeout with the option to continue the session. If you select to continue the session, the timeout counter resets. The 10 minute timeout interval is not configurable. See Users for information on how to set up and maintain users in Energy Hub. |
2 | Host computers and mobile devices |
Use general best practices to secure your computers, mobile devices, and software. To reduce cybersecurity risks:
|
3 | IT networks |
Secure your IT networks. Get expert help and advice to deploy and maintain the right network architectures and cybersecurity measures for your organization. |
4 | Cloud services |
No end user actions are required. Schneider Electric partners with cloud service providers who use industry-leading, ISO/IEC 27001 compliant cybersecurity solutions to protect cloud resources. |
5 | Device gateways |
Keep your device gateways secure. Follow the cybersecurity guidelines provided with your gateway devices. |
6 | Device networks |
Secure your device networks. Get expert help and advice to deploy and maintain the right network architectures and security measures for your organization. |
7 | Monitoring devices |
Keep your monitoring devices secure. Follow the cybersecurity guidelines provided with your monitoring devices. |
General Schneider Electric cybersecurity related resources, that are available on the Schneider Electric website:
- For security notifications or bulletins, to report a potential vulnerability, or to learn about how Schneider Electric manages vulnerabilities, see Cybersecurity Support Portal (webpage).
- For data privacy information, see Schneider Electric Data Privacy Policy (webpage).
- For recommended cybersecurity best practices, see Recommended Cybersecurity Best Practices (white paper).
- For information on how to design and implement cyber secure systems, see EcoStruxure™ Power Guide for Designing and Implementing a Cyber Secure Digital Power System (user guide).