Importance of Access Security

Access Security is a key part of an overall security system.

Controlling access to the groov EPIC processor can be one part of a total security system that includes other best practices; for example, requiring that authorized users change their passwords every three months or securing the control equipment in a locked cabinet with keys accessible by a limited number of personnel.

The groov EPIC processor provides several features to help you control access, including:

  • Two Ethernet network interfaces, which cannot communicate with each other directly. This provides the convenience of connecting to two different networks while also providing a physical boundary between the two networks.
  • Firewalls that can be configured with varying degrees of granularity or complexity:
  • Control access by enabling or disabling the network interfaces
  • Control access by assigning protocols to use specific network interfaces, which can prevents them from transmitting information to other networks
  • Create rules that assign specific ports and network interfaces to TCP/UDP, TCP, or UDP protocols
  • Create multiple user IDs, each with limited access to specific services or limited scope of access to those services
  • Configure SSL and adding certificates

CAUTION: The groov EPIC processor does not provide timeout-based logout. You must implement the important practice of always logging out of any ID that has administrator authority to prevent unauthorized access to the processor.

Summary

Summary

Controlling access to the groov EPIC processor can be one part of a total security system that includes other best practices.