Good morning,
I’d like to raise a concern regarding the cybersecurity of DESS systems, specifically the risk of potential hacker attacks via the internet. If I’ve misunderstood any existing configuration options, I apologize in advance and would appreciate any clarification or guidance.
To ensure robust cybersecurity, I believe DESS systems should be configured with the following principles:
-
Critical system configurations—such as GX settings, MPII configurations, and firmware updates—should be accessible only from the local network, not via the internet.
-
DESS and VRM should not require full remote access to the local system. They primarily exchange non-critical data, such as the target State of Charge (SOC) from the cloud and telemetry information from the GX.
Currently, the GX-Settings-VRM offers three options:
-
Off
-
Read-only
-
Full (required for DESS functionality)
However, the “Full” option enables remote modification of system settings, which poses a significant security risk if the VRM cloud were ever compromised.
Proposal: Add a Fourth Option – “DESS”
I propose introducing a fourth configuration option called “DESS”, which would:
-
Allow only the necessary data exchange between the cloud and the GX for DESS and Telemetry operation.
-
Prevent any remote modification of system settings from outside the local network.
For users who explicitly want full remote configuration capabilities, the “Full” option would remain available. However, for users like myself who prioritize security this new “DESS” option would offer a safer alternative.
Why This Matters
If a hacker gains access to Victrons VRM cloud, systems configured with “Full” access could be remotely altered in ways that may compromise safety or performance. Given that ESS systems are part of our critical home infrastructure, it’s essential to minimize exposure of sensitive settings to the internet.
Would it be possible to consider adding this fourth option to the configuration settings?
