0% found this document useful (0 votes)
684 views

ALERTON COMPASS 2 Building Automation System User Guide

This document provides a summary of security best practices for Compass users. It discusses disaster recovery planning, system installation and configuration, maintenance and monitoring, and decommissioning. Key recommendations include developing a disaster recovery plan, installing antivirus software and updating it frequently, monitoring the system for intrusions, performing regular backups, and applying all security patches and updates. The document also includes a checklist for securing the Compass installation.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
684 views

ALERTON COMPASS 2 Building Automation System User Guide

This document provides a summary of security best practices for Compass users. It discusses disaster recovery planning, system installation and configuration, maintenance and monitoring, and decommissioning. Key recommendations include developing a disaster recovery plan, installing antivirus software and updating it frequently, monitoring the system for intrusions, performing regular backups, and applying all security patches and updates. The document also includes a checklist for securing the Compass installation.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

COMPASS 2

End User Security Guide


Compass End User Security Guide

CONTENTS
Welcome to Compass Security ................................................................................................................ 6
Disclaimer ............................................................................................................................................... 6
Introduction and Intended Audience ......................................................................................................... 7
Related security documents ................................................................................................................... 7
System Overview..................................................................................................................................... 8
Design and planning .............................................................................................................................. 10
Disaster recovery planning ................................................................................................................... 10
Developing a disaster recovery plan ................................................................................................. 10
Backup and recovery strategy........................................................................................................... 10
Installation, configuration, and system delivery....................................................................................... 12
Maintenance and monitoring .................................................................................................................. 13
Access control system .......................................................................................................................... 13
Security updates and service packs...................................................................................................... 13
Microsoft security updates ................................................................................................................ 13
Microsoft service packs .................................................................................................................... 13
Compass patches and updates......................................................................................................... 13
Virus protection .................................................................................................................................... 13
Installing antivirus software ............................................................................................................... 13
Ensure frequent updates to antivirus signature files .......................................................................... 13
Configuring active antivirus scanning ................................................................................................ 14
System performance ........................................................................................................................ 14
System monitoring ............................................................................................................................... 14
Detecting network intrusion............................................................................................................... 14
Disaster recovery maintenance activities .............................................................................................. 15
Restoring the Compass job and database......................................................................................... 15
Decommissioning and disposal.............................................................................................................. 17
Compass installation security checklist .................................................................................................. 18

31-00212-01
2 Compass End User Security Guide | March 2022
©2022 Honeywell
Welcome to Compass Security

User Agreement And Limited Warranty


IMPORTANT - PURCHASE OF ALERTON PRODUCTS OR USE OF SOFTWARE, FIRMWARE AND / OR
ACCOMPANYING DOCUMENTATION (DEFINED BELOW) IS SUBJECT TO LICENSE RESTRICTIONS AND
LIMITED WARRANTY. CAREFULLY READ THIS AGREEMENT BEFORE USING ALERTON PRODUCTS,
SOFTWARE, FIRMWARE AND/OR DOCUMENTATION.

This is a legal "Agreement," concerning the purchase of Products and use of Software, Firmware and/or
Documentation, between you, the "User" (either individually or as an authorized representative of the company that is
purchasing, has purchased, or is using the Products, Software, Firmware or Documentation) and Honeywell, 715,
Peachtree street NE, Atlanta, GA, 30308 USA. ("Honeywell").

PURCHASE OF ALERTON PRODUCTS OR USE OF SOFTWARE, FIRMWARE AND / OR ACCOMPANYING


DOCUMENTATION INDICATES USER'S COMPLETE AND UNCONDITIONAL ACCEPTANCE OF THE TERMS
AND CONDITIONS SET FORTH IN THIS AGREEMENT.

Honeywell provides Alerton products ("Products"), software programs ("Software"), firmware, e.g., protocols, software
program code, device drivers and related hardware ("Firmware") and accompanying documentation
("Documentation") and grants a non-exclusive and non-transferable license ("License") to User to use the Software
and the Firmware only on the following terms and conditions. Taken together, Products, licensed Software, licensed
Firmware, and accompanying Documentation are collectively defined as "Alerton Product(s)" in this Agreement.

1. Copyright. The Software, Firmware, and Documentation are copyrighted and protected by United States copyright
laws and international treaty provisions and laws, contain valuable proprietary products, information, and trade
secrets, and shall remain the property of Honeywell. User may not and shall not copy or otherwise reproduce or make
available to any other party any part or all of the Software, Firmware or Documentation nor decompile, disassemble,
reverse engineer, manufacture or modify any portion of the Products, Software, Firmware, Documentation or any
portion of the same for any purpose or otherwise attempt to determine the underlying source code of the Software or
Firmware or permit any such action; provided however, User may either (a) make one (1) copy of the Software solely
for backup or archival purposes, or (b) transfer one (1) image of the Software to a single hard disk, CD or other
comparable media, provided User keeps the original solely for backup or archival purposes.

2. License. User is hereby licensed to use one (1) copy of the Software for User's own use in operating the Products.
User may not rent, lease or otherwise assign or transfer all or any part of the Software, Firmware, or Documentation.
In addition, User may not sublicense, assign or transfer this License or Agreement, or any part thereof. Any attempt
to do so shall terminate this License and User's right to use the Software and Firmware and shall subject User to
liability for damages to Honeywell. LICENSING TO USER OF THE SOFTWARE AND FIRMWARE COMMENCES
WHEN USER USES THE SOFTWARE, FIRMWARE AND / OR ACCOMPANYING DOCUMENTATION.

3. Copies, Modification, or Merger. Except as specifically set forth in Paragraph 1, User may not copy, modify,
transfer all or any portion of the Software, Firmware, or Documentation or merge it or them into another program,
unless expressly authorized in advance in writing by Honeywell. User must, as a condition of this License, reproduce
and include the identifying marks, copyright, and proprietary notices on any permitted copy of the Software,
Firmware, and Documentation. "Copies" shall include, without limitation, any complete or partial duplication on any
media, adaptations, translations, compilations, partial copies within modifications, mergers with other material from
whatever source, and updated works. User will use its best efforts to prevent any unauthorized copying or other
activity with respect to the Software, Firmware, and Documentation.

4. Third-Party Beneficiary. For any software or other technology under this Agreement licensed by Honeywell from
Microsoft (or other licensors), Microsoft or the applicable licensor is a third-party beneficiary of this Agreement with
the right to enforce the obligations set forth in this Agreement.

5. Warranty. Honeywell warrants Honeywell manufactured or produced Alerton Products to be materially free from
defects and to substantially conform to Honeywell's published specifications for a period of twenty -four (24) months
from date of shipment from Honeywell (the "Product Warranty Period"). This entire Section 5 is defined as the
"Warranty."

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 3
Compass End User Security Guide

Honeywell also warrants Alerton Products that it has previously repaired or replaced for the greater of ninety (90)
days from the date of their shipment from Honeywell or the remainder of the Product Warranty Period of the originally
shipped Alerton Product (the "Repair/Replacement Warranty Period").

During the Product Warranty or Repair/Replacement Warranty Period, Honeywell will repair or replace the applicable
Alerton Products without charge and will add applicable engineering changes and upgrades.

This Warranty only applies to defective materials and workmanship of Alerton Products and excludes defects that
result from misuse, neglect, improper installation, unauthorized repair or alteration, damage during or after shipping,
accident, and/or misapplication of such products. This Warranty does not apply to parts, equipment, software,
firmware, components, documentation, or any other item that Honeywell does not manufacture or produce. This
Warranty is also voided by removal or alteration of Alerton Product identification labels.

Honeywell's sole responsibility with respect to Alerton Products shall be, within the applicable Product Warranty
Period, to furnish a replacement Alerton Product (FOB factory) or, at the option of Honeywell, to repair and return
(FOB Factory) the defective Alerton Product. HONEYWELL HEREBY EXCLUDES ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ALL OTHER EXPRESS OR IMPLIED
WARRANTIES WHATSOEVER WITH RESPECT TO ALERTON PRODUCTS. In no event shall Honeywell be liable
for personal injury, loss of profit, loss of production, loss of business or goodwill, business interruption, loss of
business information or data, loss due to delays, any other pecuniary loss, any cost or liability of Users or any other
parties, to themselves or to others, increased or uncovered operating or fixed costs, inefficiency, or any other special,
exemplary, consequential, incidental, indirect or remote damages in any manner, directly or indirectly, related to
design, manufacturing, supply, installation or use of, or inability to use, Alerton Products, or any other act or failure to
act by Honeywell or its agents or contractors.

HONEYWELL MAKES NO CLAIMS OR WARRANTIES WITH RESPECT TO THE SOFTWARE OR THE


FIRMWARE AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE AND EXPRESS OR IMPLIED WARRANTIES THAT THE OPERATION
OF THE SOFTWARE OR FIRMWARE OR ANY PORTION THEREOF WILL BE INTERRUPTION OR ERROR-
FREE. Notwithstanding anything to the contrary contained in this Warranty, Honeywell shall not be liable to Users or
any other parties for any damages, including, but not limited to consequential, incidental, indirect, special, exemplary
remote or pecuniary damages and any stated or express warranties set forth in this warranty are in lieu of all
obligations or liability for any damages arising out of or in connection with the use or performance of, or inability to
use, Alerton Products and the licensed Software and Firmware.

User's exclusive remedy and Honeywell's entire liability arising from or in connection with the Alerton Products,
Software, Firmware, Documentation and/or this License and Agreement (including, without limitation, any breach of
any warranty, express or implied) shall be, at Honeywell's option, the repair or replacement of the Products or
Software or Firmware as applicable, as stated above. ACCORDINGLY, HONEYWELL AND ITS DESIGNATED
DEALERS AND THEIR DESIGNATED ASSOCIATE DEALERS HAVE EXCLUDED AND DISCLAIM ANY AND ALL
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND ALL OTHER
WARRANTIES, EXPRESS OR IMPLIED, WHATSOEVER, WITH RESPECT TO THE PRODUCTS, THE
SOFTWARE, THE FIRMWARE, THE DOCUMENTATION AND/OR THE LICENSE. USER HEREBY
ACKNOWLEDGES THE SAME.

6. Remedies of Honeywell. IF USER BREACHES THIS AGREEMENT, USER'S LICENSE HEREUNDER SHALL BE
AUTOMATICALLY TERMINATED. Upon termination, User shall return the Software, Firmware, and all
Documentation to Honeywell and destroy any copies of the Software, Firmware, and the Documentation or any
portions thereof which have not been returned to Honeywell, including copies resident on electronic or digital media.
If User breaches this Agreement, Honeywell shall be entitled to all damages suffered by Honeywell resulting from
such breach and Honeywell shall be entitled to equitable and injunctive relief in addition to all other remedies at law.
In this regard, User acknowledges that its breach of any provision of this Agreement will cause Honeywell immediate
and irreparable injury for which there are inadequate remedies at law. The prevailing party in any dispute concerning
this Agreement shall be entitled to the costs of collection and enforcement, including but not limited to reasonable
attorneys' fees, court costs, and all necessary expenses, regardless of whether litigation is commenced.

31-00212-01
4 Compass End User Security Guide | March 2022
©2022 Honeywell
Welcome to Compass Security

7. Export. Alerton Products are subject to regulation by local laws and United States government agencies, which
prohibit export or diversion of certain products, information about the products, and direct products of the products to
certain countries and certain persons. User agrees that User will not export in any manner any Alerton Product or
direct product of Alerton Product, without first obtaining all necessary approval from appropriate local and United
States government agencies.

8. RESTRICTED RIGHTS NOTICE. Alerton Products, Software, Firmware, and Documentation have been developed
entirely at private expense and are commercially provided with RESTRICTED RIGHTS. Use, duplication, or
disclosure by the U.S. Government or a U.S. Government subcontractor is subject to the restrictions pursuant to
DFARS 227.72013 (October 1988) and DFARS 52.227-19 (June 1987), as amended and as applicable.
Manufacturer, licensor, and publisher is Honeywell, 715, Peachtree street NE, Atlanta, GA, 30308 USA.

9. Statute of Limitations. No action for any breach of a warranty, if any, deemed or actual, may be commenced more
than one (1) year following the expiration of such warranty.

10. Other. User further agrees that this Agreement is the complete and exclusive statement of the agreement
between User and Honeywell and supersedes any proposal or prior agreement or any other communications
between Honeywell or any of its representatives and User relating to the use of the Software, Firmware,
Documentation, and purchase of the Products. This Agreement may only be modified by a physically signed writing
between User and Honeywell. Waiver of terms or excuse of breach must be in writing and shall not constitute
subsequent consent, waiver, or excuse. If any provision of this Agreement is finally determined to be unenforceable,
the remaining provisions shall remain in effect. The laws of the State of Georgia and the United States, including U.S.
copyright laws, shall govern this Agreement. Venue in the event of any suit, proceeding, or claim shall be in the
courts located in Fulton County, Georgia, USA. If User has any questions regarding this Agreement, User may
contact Honeywell by writing Honeywell at the above address.

This Agreement shall inure to the benefit of and be binding upon the parties and their successors, administrators,
heirs and permitted assigns. Notwithstanding any termination of this Agreement and not in limitation of any other
provision of this Agreement, User shall specifically continue to be fully obligated to comply with all of the requirements
of paragraphs one (1) through four (4), as if the Agreement were not terminated and all remedy provisions hereunder
shall apply to any breach of such obligations.

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 5
Compass End User Security Guide

WELCOME TO COMPASS SECURITY


Welcome to Compass, Alerton’s operator workstation software for building automation systems.
Compass is your command and control center for facility operations from HVAC equipment to
irrigation, lighting, security, and more. Here, you can view and command site equipment and
systems with unprecedented flexibility and power.

DISCLAIMER
While we have engaged in efforts to assure the accuracy of this document, Alerton is not
responsible for damages of any kind, including without limitations consequential damages
arising from the application or use of the information contained herein. Information and
specifications published here are current as of the date of this publication and are subject to
change without notice. The latest product specifications can be found on our website or by
contacting our corporate office in Atlanta, Georgia.
Alerton
715, Peachtree street, NE
Atlanta, GA 30308, USA
[email protected]

31-00212-01
6 Compass End User Security Guide | March 2022
©2022 Honeywell
Introduction and Intended Audience

INTRODUCTION AND INTENDED AUDIENCE


This manual contains information to guide the end-user or owner of a Compass system to
securely maintain and decommission their system.
Please take the time to read and understand the information in this manual and regularly obtain
the latest version of documentation and software updates.

Related security documents


The following diagram shows the relationships and current state of the other Ascent security
manuals.

Document Description

Compass Dealer Security Guide Provides security-related instructions for planning, installing, and configuring a
(31-00211) Compass system. The intended audience is an Alerton dealer.

Compass End-User Security Guide Provides security-related instructions for maintaining and decommissioning a
Compass system. The intended audience is the Compass system owner and
(31-00212) end-user.

ACM Dealer Security Guide Provides security-related instructions for planning, installing, and configuring
(31-00213) an ACM. The intended audience is an Alerton dealer.

ACM End-User Security Guide Provides security-related instructions for maintaining and decommissioning an
(31-00214) ACM. The intended audience is the Compass system owner and end-user.

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 7
Compass End User Security Guide

SYSTEM OVERVIEW
The following is a diagram of a typical Ascent system installation.

The key elements of the diagram are:


Internet/intranet/corporate network: This is a simplified, logical network representation of all
networks outside of the building automation system (BAS) scope. It may provide access to the

31-00212-01
8 Compass End User Security Guide | March 2022
©2022 Honeywell
System Overview

BAS management interfaces (e.g. the Compass primary workstation web user interface) but
must provide access to the Internet so that Compass computers can check for and download
operating system and virus scanner updates unless another means to do this is provided.
BAS network: This network is used solely for BAS protocols, which consists of BACnet/IP,
BACnet/Ethernet, and any protocols that Niagara Integration Services on an ACM might use.
This network must not be the same network as the Internet/intranet/corporate network.
BAS firewall: To provide additional separation and protection to the BAS, a firewall must be
used between the Internet/intranet/corporate network and any BAS device that connects to it,
such as the Compass primary workstation, Compass workstations, and ACMs. This firewall
limits access to the BAS to only computers that are authorized and may help reduce the risk of
attacks, such as a denial-of-service attack.
Compass primary workstation: The Compass primary workstation is a computer running
Compass software. It requires two network connections – one for connecting to the
management web user interface through a web browser (usually on the
Internet/intranet/corporate network) and another for connecting to the BAS network.
Web browser: Compass software provides a web-based management interface that is
accessed through a web browser.
ACM and BCMs: The Alerton Control Module (ACM) and BACtalk Control Modules (BCMs) are
global controllers that connect to an Ethernet network and host MS/TP network segments.
MS/TP is a low-bandwidth connection that is used to connect controllers and sensors.
• ACM Niagara Integration Services: The ACM has an instance of Niagara and so it can run
Niagara code, including a web server. If this functionality is used, then connect the ACM’s
second network to the Internet/intranet/corporate network through the BAS firewall.
Compass workstation (optional): If access to the Compass primary workstation’s thick client
interface is not allowed, for example, the Compass primary workstation is run in a virtual
machine or console access to it is not allowed, then install a Compass workstation on a
separate computer to access thick client functionality.
VIP & VXIO: The Alerton VisualLogic IP Controller (VIP) is a BACnet Advanced Application
Controller (B-AAC) with a real-time clock, high resolution 16-bit universal inputs and outputs,
and a 32-bit processor.
VLX, VLC, or EXP: The Alerton controllers are advanced application controller with a high-
resolution converter and new, high performance processor and real-time clock that supports its
own schedules, trendlogs and alarms. The controllers include monitored on-board Hand-Off-
Auto (HOA) switches, Ethernet or MS/TP connectivity, and additional math functions beyond the
standard VLC/VAV controllers.
SQL Server (optional): Compass software can be configured to use an external SQL Server.

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 9
Compass End User Security Guide

DESIGN AND PLANNING


During the design and planning phase, you should discuss the following with your Alerton
dealer:
• Your needs and requirements for physical and network security of the BAS and its
components, such as devices, computers, and networking equipment. Also consider
regulatory requirements, such as compliance with PCI (credit card processing security
standards), FDA, etc.
• Your needs and requirements for accessing the system outside of your internal networks,
such as using the Internet or a VPN.
• Your organization’s current knowledge level and capabilities in maintaining security of the
system.
Remember that while a BAS might not necessarily be the primary target of an attack, it might be
targeted as a way to access other systems.

Disaster recovery planning


Another design and planning activity is to develop a Disaster Recovery Plan.
Developing a disaster recovery plan
As part of your security strategy, define a comprehensive backup and restore policy for disaster
recovery. If you don’t already have a policy or a group that handles this, your Alerton dealer may
be able to help in creating one. In formulating this policy, consider:
• How quickly data or the system needs to be restored. This will indicate the need for a
redundant system, spare offline computer, or file system backups.
• How long data needs to be kept.
• The frequency of changes to critical data and configuration settings. This will dictate the
frequency and scope of backups.
• The safe onsite and offsite storage of full and incremental backups.
• The safe storage of all Microsoft operating system and Compass installation media, license
keys, and configuration information.
• Who will be responsible for creating backups, and the testing, storage, and restoration of
backed up files.
Backup and recovery strategy
Performing backups is one of the most important risk mitigation tasks for securing your
Compass system. If backups of important data are not made, then data will be lost if a hardware
or software failure occurs, if configuration files are deleted, if the system is infected with a virus
or worm, or in the event of a natural disaster like fire or flood.
Choosing an appropriate backup strategy allows you to minimize downtime due to situations
that cause loss of data. When determining your backup strategy, consider the types of situations
that can occur:

31-00212-01
10 Compass End User Security Guide | March 2022
©2022 Honeywell
Design and planning

• Media failure: If one or more disk drives fail, there is a potential for a complete loss of data
unless the system was properly backed up.
• User error: If a user makes invalid modifications to configuration data, then an effective way
to undo these changes is to restore the data from backup.
• Permanent loss of a server: If a server becomes permanently unusable, then the system and
data have to be reconstructed unless you have a backup.
• Virus or worm infection: If a virus infects the Compass workstation, then it could delete or
corrupt files making it difficult or impossible to restore the system configuration.
Also consider:
• CD and DVD are not considered to be reliable backup mediums.
• Backups can be CPU- and disk-intensive operations on a large system. Perform backups at
times that do not have a lot of system load.
• Do not store backup images on the Compass primary workstation or, if used, the SQL
Server computer.
• Do not store backup images on the same computer being backed up.
• Backup images should be stored on network drives.
• If network drives are not available, then store backup images to a connected drive using
USB.
• Not all backup products support backing up SQL Server, especially when SQL Server is
running with open files.
• Configure your backup software product to do a full backup weekly and incremental backups
nightly to lower the load and performance impact from backup activities.
• Ensure that you have enough file storage space to hold all backups.
• Ensure that verification is performed after the backup has completed to guarantee that the
data was backed up correctly.
An effective Disaster Recovery Plan must be documented and all personnel involved must be
knowledgeable of its content and storage location.

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 11
Compass End User Security Guide

INSTALLATION, CONFIGURATION, AND SYSTEM DELIVERY


Alerton provides instructions and guidance for your dealer on how to properly install and
configure your Compass system. Compass must be configured to use HTTPS, even on a
private network. If Compass is configured to use SQL Server as its database, extra care must
be taken to protect the SQL Server system and ensure its operation as it is critical to Compass’s
operation. As part of system delivery, your dealer should:
• Provide documentation that includes security information, configuration settings,
administration usernames and passwords, disaster and recovery plans, backup and restore
procedures
• Train end-users on security maintenance tasks.

31-00212-01
12 Compass End User Security Guide | March 2022
©2022 Honeywell
Maintenance and monitoring

MAINTENANCE AND MONITORING


Regular maintenance and monitoring are required to maintain the security of the system.

Access control system


Monitor logs and system alerts for unauthorized access. Inspect and maintain the system to
ensure it is operating as intended and has not been circumvented.

Security updates and service packs


An important part of the overall security strategy is to ensure that the operating system is kept
up-todate with the latest patches and updates.
Microsoft security updates
Discuss with your Alerton dealer your strategy for checking for and applying Windows Updates.
For example, for a computer running a Compass primary workstation, you may wish to manually
apply updates so that you can control the time that the primary workstation is unavailable, but
for other computers, you may decide to let Windows Updates automatically apply updates.
Microsoft service packs
Check with your Alerton dealer before applying a service pack to see if there are any known
issues or incompatibilities.
Compass patches and updates
Check with your Alerton dealer on a regular basis to see if there are Compass patches or
updates available.

Virus protection
Ensuring that antivirus software is installed, properly configured, regularly updated, and
monitored is an essential part of system security.
Installing antivirus software
If antivirus was not installed by your Alerton dealer, then install it on every computer in the
network, including:
• Compass primary workstation
• Compass client workstations and web clients
After installing antivirus software, check the Windows Event Logs to ensure no errors are
reported. If the system starts experiencing failures, the inability to read or write files, the logs
show deadlock errors, or the system shows any other unusual behavior, disable the antivirus
software to see if the failures continue. Note that some antivirus software may need to be
completely uninstalled in order to be disabled.
Ensure frequent updates to antivirus signature files
It is important to update antivirus signature files frequently by:

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 13
Compass End User Security Guide

• Subscribing to the updates of your antivirus software vendor(s)


• Leveraging enterprise antivirus policies and practices when available
Since new viruses are released every day, the system will remain vulnerable to attack if the
signature files are not updated at the same rate. Where it is not practical to perform updates
daily, monitor reputable web sites that publish information about new virus attacks so that the
system can be isolated if a specific threat appears.
Receipt of new signature files generally requires Internet access so that the files can be
downloaded from the antivirus software vendor. If possible, set up servers for the controlled
distribution of antivirus signature files.
Configuring active antivirus scanning
Adopting an active virus scanning strategy as on-access scanning provides the best real-time
protection for your system. Additionally, run on-demand scans during regular, scheduled
maintenance to catch any malicious files or programs which may be dormant on the computer.
Configure both on-access and on-demand scanning to:
• Scan the boot sectors of all disks.
• Move infected files to a quarantine directory and notify the user that an infected file was
found. Allow the user to clean up the infection.
System performance
If Compass is experiencing problems and you suspect antivirus software might be an issue,
then contact your Alerton dealer.

System monitoring
Diligent system monitoring will help guard your system against unauthorized access. However,
there is always the possibility that an attacker will succeed in circumventing all the safeguards
and compromise the system. If this happens, it is important to discover the breach and prevent
further damage as rapidly as possible. The earlier a system breach is detected and the more
evidence that is captured, then the less damage is likely to occur and the greater the chances of
identifying the intruder. Logs that may be collected in the system are:
• Windows Audit Logs (if enabled)
• Antivirus software logs or reports
• Access control system
Detecting network intrusion
Network Intrusion Detection Systems (NIDS) can take many forms. NIDS can be a dedicated
server on the same network branch, freeware software available under GNU or similar licenses
(most of these are aimed at UNIX systems), or commercial products aimed specifically at
Windows systems.

31-00212-01
14 Compass End User Security Guide | March 2022
©2022 Honeywell
Maintenance and monitoring

The purpose of NIDS is to scan incoming network packets and look for unusual traffic or for
specific malformed packets known to be associated with attacks. If anomalies are found, NIDS
take action such as raising alerts or even disconnecting the computer from the network. The
latter is a dangerous option which causes its own denial of service while preventing damage to
the system by closing network ports, and so on.
Most firewalls, switches, and routers have reporting capabilities that can report various levels of
events ranging from debugging to emergency failure. These reports can be viewed using telnet,
collected by a central logging server, or emailed to an administrator. For example, the Cisco PIX
firewall and Catalyst 4500 switches can be configured to send selected levels of events to a
central syslog server where further analysis can occur and significant events can be detected.
Syslog servers are common on Unix systems, and third-party syslog services are available for
Windows. They vary in functionality and cost, from freeware, which simply writes to a log file, to
sophisticated NIDS that analyze the logs in detail. As well as being able to control the level of
severity of events, the PIX firewall allows the suppression of individual messages. This can
significantly reduce clutter and also provide some ability to recognize common attack signatures
and raise appropriate alarms.
When you configure network event logs, maintain a balance between collecting too many
events (and missing something important) and filling storage disks and deleting information
(which is subsequently needed for an intrusion investigation).
Other forms of intrusion detection will search event logs looking for unusual events, or will
compare the current file system to a known good image. Be careful when running such tools to
prevent them from using too many resources and interfering with the control system.

Disaster recovery maintenance activities


Schedule regular job backups according to your Disaster Recovery Plan. Configure your backup
software product to do a full backup weekly and incremental backups nightly to lower the load
and performance impact from the backup activities. The frequency of backups depends on two
major criteria:
• How often job configuration is changed.
• Where job data is stored.
If job data is stored in SQL Server, then the Compass Backup and Restore functionality does
not back that data up. You must ensure Compass’s SQL Server database is periodically backed
up through an external mechanism. The backup policy is best managed by the site’s database
administrator (DBA); see Backup Overview (SQL Server) on Microsoft’s Developer Network at
http://msdn.microsoft.com/en-us/library/ms175477.aspx for more information.
Restoring the Compass job and database
If loss of data occurs, both the job and the SQL Server database may need to be restored.

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 15
Compass End User Security Guide

The process for restoring the job backup can be found in the Compass online Help by searching
for Restore Utility.
Restoring a SQL Server backup is best handled by the site’s DBA; see Restore a Database
Backup (SQL Server Management Studio) on Microsoft’s Developer Network at
http://msdn.microsoft.com/en-us/library/ms177429.aspx for more information.

31-00212-01
16 Compass End User Security Guide | March 2022
©2022 Honeywell
Decommissioning and disposal

DECOMMISSIONING AND DISPOSAL


Dispose of equipment and data securely. Consider the following:
• How sensitive is the data?
• Are there any regulatory requirements relating to retention time periods or proof of
destruction for data or devices?
• Are there backups of the data that also need to be disposed of? This might consist of
backup devices, tapes, or cloud storage.
• Are there adjacent systems that must also be modified? For example, do you need to
remove system-specific users from an authentication database or SQL Server accounts?
• Are there networking or other infrastructure systems that need to be modified? For example,
do you need to close firewall ports, remove router configurations, or disable VPN access?
• If there was a different BAS, were these items considered when it was removed?

31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 17
Compass End User Security Guide

COMPASS INSTALLATION SECURITY CHECKLIST

Compass Job Name: _____________________________________________________


Compass Job Location: ___________________________________________________
Installer: ___________________________________ Date: _______________________

Complete the following security tasks for your Compass installation.


 Develop a Disaster and Recovery Plan. See page 10.
 Develop a Backup and Recovery Strategy. See page 10.
 Verify that the system is well-documented upon delivery. See page 12.
 Monitor system logs and alerts for unauthorized access. See page 13.
 Update the operating system with the latest patches and updates. See page 13.
 Discuss your Windows Updates strategy with your Alerton dealer. See page 13.
 Check with your Alerton dealer for new Compass patches or updates. See page 13.
 Install and configure anti-virus software. See page 13.
 Set up network intrusion detection. See page 14.
 Schedule regular job backups according to your Disaster Recovery Plan. See page 15.
 For decommissioning, dispose of data securely. See page 17.

31-00212-01
18 Compass End User Security Guide | March 2022
©2022 Honeywell
This page is intentionally left blank.
ALERTON
31-00212-01 I 2022-04
715 Peachtree St NE
© 2022 All Rights Reserved
Atlanta, Georgia 30308
alerton.com Honeywell International Inc.

You might also like