EATON Green Motion AC Chargers Secure Configuration User Guide

June 3, 2024
EATON

Green Motion AC Chargers Secure Configuration

Eaton Cybersecurity Center of Excellence Cybersecurity Recommendations
Eaton Green Motion AC chargers
Secure configuration guidelines

Documentation to securely deploy and configure Eaton products

Eaton Green Motion AC EV chargers have been designed with cybersecurity as an important consideration. A number of features are offered in the product to address cybersecurity risks. These Cybersecurity recommendations provide information to help users to deploy and maintain the product in a manner that minimizes the cybersecurity risks. These Cybersecurity recommendations are not intended to provide a comprehensive guide to cybersecurity, but rather to complement customers’ existing cybersecurity programs.
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products and solutions, making them more secure, reliable and competitive for customers.
The following whitepapers are available for more information on general cybersecurity best practices and guidelines:
Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdf
Cybersecurity Best Practices Checklist Reminder (WP910003EN):
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity /white-papers/WP910003EN.pdf
Cybersecurity Best Practices for Modern Vehicles – NHTSA
https://www.nhtsa.gov/staticfiles/nvs/pdf/812333_CybersecurityForModernVehicles.pdf

Category Description
Intended Use & Deployment Context Applicable to Eaton Charging network

manager or third-party backend connected product. Applicable to end customer. Deployed at customer premises on parking places, private or publicly accessible, to allow charging of EVs, authentication, billing, etc.
Asset Management| Keeping track of software and hardware assets in your environment is a pre-requisite for effectively managing
cybersecurity. Eaton recommends that you maintain an asset inventory that uniquely identifies each important component. To facilitate this, Eaton Green Motion Building supports the following identifying information:
SW release for Green Motion AC Home:
• APP: 108x
• OS: 2.3.1-AC-PROD
• MACH: cm3 or cm4
• MPB: 831
• Version date 25.05.2022 or newer
The information above can be accessed on the configuration Webpage or via the communication protocol OCPP “SystemInformation”.
Risk Assessment| Eaton recommends conducting a risk assessment to identify and assess reasonably foreseeable internal and external risks to the confidentiality, availability and integrity of the Eaton Green Motion Building and its environment. This exercise should be conducted in accordance with applicable technical and regulatory frameworks such as IEC 62443 and NERC-CIP. The risk assessment should be repeated periodically.
Physical Security| An attacker with unauthorized physical access can cause serious disruption to system/device functionality. Additionally, Industrial Control Protocols do not offer cryptographic protections, making ICS and SCADA communications especially vulnerable to threats to their confidentiality. Physical security is an important layer of defense in such cases. Eaton Green Motion Building is designed to be deployed and operated in a physically secure location. Following are some best practices that Eaton recommends to physically secure your system/device:
• Secure the facility and equipment rooms or closets with access control mechanisms such as locks, entry card readers, guards, man traps, CCTV, etc. as appropriate.
• Restrict physical access to cabinets and/or enclosures containing Eaton Green Motion Building.
• Physical access to the telecommunication lines and network cabling should be restricted to protect against attempts to intercept or sabotage communications. It is a best practice to use metal conduits for the network cabling running between equipment cabinets.
• Eaton Green Motion Building supports the following physical access ports: Serial Port, Ethernet, Modbus, CAN bus. Access to these ports should be restricted.
• Do not connect removable media (e.g., USB devices, SD cards, etc.) for any operation (e.g., firmware upgrade, configuration change, or boot application change) unless the origin of the media is known and trusted.
• Before connecting any portable device through a USB port or SD card slot, scan the device for malware and viruses.
Time Synchronization| Many operations in power grids and IT networks heavily depend on precise timing information. Ensure the system clock is synchronized with an authoritative time source (using manual configuration, NTP, SNTP, or
IEEE 1588).
Time synchronization will occur automatically once the device get access to NTP.
Network Security| Eaton Green Motion Building supports network communication with other devices in the environment. This
capability can present risks if it’s not configured securely. Following are Eaton recommended best practices to
help secure the network. Additional information about various network protection strategies is available in Eaton Cybersecurity Considerations for Electrical Distribution Systems [R1]. Eaton recommends segmentation of networks into logical enclaves, denying traffic between segments except that which is specifically allowed, and restricting communication to host-to-host paths (for example, using router ACLs
and firewall rules). This helps to protect sensitive information and critical services and creates additional barriers in the event of a network perimeter breach. At a minimum, a utility Industrial Control Systems network should be segmented into a three-tiered architecture (as recommended by NIST SP 800-82[R3]) for better security control. Communication Protection: Eaton Green Motion Building provides encryption of its network communications.
This encryption is always activated and there is no need to configure it.
• Secure protocol usage HTTPS
• TLS/SSL configuration by default
• Secure cipher suites TLS 1.2 by default
Eaton recommends opening only those ports that are required for operations and protect the network
communication using network protection systems like firewalls and intrusion detection systems / intrusion
prevention systems. Use the information below to configure your firewall rules to allow access needed for
Eaton Green Motion Building to operate smoothly
• TCP port 53 shall be open to allow DNS
• TCP port 80 shall be open for HTTP (Nginx, webpage)
• TCP port 8082 shall be open to allow TCP/UDP
• TCP port 5355 shall be open to allow LLMNR (TCP/UDP)
• TCP port 67 shall be open to allow DHCP server
• TCP port 443 shall be open to allow OCPP connection with CPO backend
4G modem connected through serial USB to CPU, use point-to-point protocol (ppp). It is recommended to use.
4G IoT SIM cards which support below security features to provide internet connectivity between the charging station and server.
Recommended Security features
• To use a private Access Point Name (APN) while installing Green Motion Building and commissioning the Charging network manager.
• To utilize 4G SIM service providers that provide an option to encrypt the data communications using either a Virtual private network (VPN) or IPSec protections to enable Universal integrated circuit card (UICC) pin to prevent unauthorized access to network.
Logging and Event Management| • Eaton recommends logging all relevant system and application events, including all administrative and
maintenance activities.
• Logs should be protected from tampering and other risks to their integrity (for example, by restricting permissions to access and modify logs, transmitting logs to a security information and event management system, etc.).
• Ensure that logs are retained for a reasonable and appropriate length of time.
• Review the logs regularly. The frequency of review should be reasonable, taking into account the sensitivity and criticality of the system | device and any data it processes.
• Logs are available from Eaton Charging network manager, for further details, please see technical documentation or contact your local support team.
Malware Defenses| Eaton recommends deploying adequate malware defenses to protect the product or the platforms used to run the Eaton product.
Secure Maintenance| The device includes SSH remote connection to allow a service engineer with help from site administrator to trouble shoot the device functionality. This connection allows service engineer to perform following tasks. The SSH port is disabled by default and shall only be enabled if strictly necessary.
• Open TCP port 22 to allow the SSH connection to be established when the service engineer requests it. Instructions will be provided by Eaton field service engineer how to enable SSH.
• The Eaton field service engineer will then be able to log into the system using a maintenance account to perform the requested support activities.
• Once the maintenance is over, the service engineer will log off the device and ask to disable the SSH port.
ote: N Enabling of TCP port 22 is provided for diagnostic purposes only and shall not be left enabled.
Best Practices Update device firmware prior to putting the device into production. Thereafter, apply firmware updates and software patches regularly. Eaton publishes patches and updates for its products to protect them against vulnerabilities that are discovered. Eaton encourages customers to maintain a consistent process to promptly monitor for and install new firmware updates.
• Firmware updates shall be managed and installed exclusively through the Eaton Charging Network Manager, which ensures that you are using trusted firmware files.
• For offline devices the following process must be followed:
1. Connect through serial
2. Enable Webserver
3. Login to Webserver (to be implemented)
4. Select firmware GM package and press upload
5. The device download the package and check the signature
6. Once signature verified, shell script update the firmware on the machine
• Local webserver can also be used to update firmware securely. The package is verified before any update with the Eaton secure key.
Sensitive Information Disclosure| Eaton recommends that sensitive information (i.e. connectivity, log data, personal information) that may be stored by Eaton Green Motion Home or Building be adequately protected through the deployment of organizational security practices.
Potential sensitive information stored in the chargers are the RFID serial of the last user of the charging station.
Decommissioning or Zeroization| It is a best practice to purge data before disposing of any device containing data. Guidelines for decommissioning are provided in NIST SP 800-88. Eaton recommends that products containing embedded flash memory be securely destroyed to ensure data is unrecoverable.
EATON Green Motion AC Chargers Secure Configuration - fig
1

  • Figure and data from NIST SP800-88
    The charging station will be recycled following process ISO9001.
    Embedded Flash Memory on Boards and Devices
    Eaton recommends the following methods for disposing of motherboards, peripheral cards such as network adapters, or any other adapter containing non-volatile flash memory.
    Clear: Reset the state to original factory settings by pressing and maintaining the reset button for at least 5 seconds.
    Refer to technical documentation for more details.
    Purge: The flash memory cannot be easily identified and removed from the board. For this reason, Eaton recommends to destroy the whole computing board.
    Destroy: Shred, disintegrate, pulverize, or Incinerate by burning the device in a licensed incinerator.

References

[R1] Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN):
http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/content/pct_1603172.pdf
[R2] Cybersecurity Best Practices Checklist Reminder (WP910003EN):
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity /white-papers/WP910003EN.pdf
[R3] NIST SP 800-82 Rev 2, Guide to Industrial Control Systems (ICS) Security, May 2015:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf
[R4] National Institute of Technology (NIST) Interagency “Guidelines on Firewalls and Firewall Policy, NIST Special Publication 800-41”, October 2009:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf
[R5] NIST SP 800-88, Guidelines for Media Sanitization, September 2006:
http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50819
[R6] Cybersecurity Best Practices for Modern Vehicles – NHTSA
https://www.nhtsa.gov/staticfiles/nvs/pdf/812333_CybersecurityForModernVehicles.pdf
[R7] A Summary of Cybersecurity Best Practices – Homeland Security
https://www.hsdl.org/?view&did=806518
[R8] Characterization of Potential Security Threats in Modern Automobiles – NHTSA
https://www.nhtsa.gov/DOT/NHTSA/NVS/Crash%20Avoidance/Technical%20Publications/2014/812074_Characterization_PotentialThreatsAutos(1).pdf
[R9] Threat Modeling for Automotive Security Analysis
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf

Eaton Industries Manufacturing GmbH
Place de la Gare 2
1345 Le Lieu, Switzerland
© 2022 Eaton
All Rights Reserved
Publication No. MZ191002EN
July 2022
Eaton is a registered trademark.
All other trademarks are property of their respective owners.
Follow us on social media to get the latest product and support information.

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals