The HOOC gateway (HOOC Connect) is used to set up an encrypted VPN connection between a site (remote network infrastructure) and the HOOC Cloud. A separate, virtual, and completely isolated network is then created for each facility in the HOOC Cloud.

The HOOC app uses Secure Remote Access to establish an encrypted VPN connection to the HOOC Cloud and the corresponding virtual network in the same way. Once the connections have been established, a “virtual network cable” (Ethernet, Layer 2) is created between the system and the HOOC app. All protocols provided in the system’s network can be used accordingly when using the HOOC solution. Other applications provided in the HOOC Cloud, such as Secure Proxy, are based on the same principle.
This section describes the available functions and interfaces. In particular, it documents all safety parameters that are under the control of the user. Safe values and recommendations are provided.
The standard configuration supplied with the HOOC gateways guarantees fast and smooth commissioning. However, some parameters of the standard configuration do not comply with the IEC 62443-4-2 standard. To ensure compliance, the following precautions are mandatory after commissioning:
The HOOC system provides several security-related functions and interfaces that are under the control of the user or integrator. These enable secure configuration, monitoring, and maintenance of the solution.
| Component / Interface | Description | Safety parameters / Options |
|---|---|---|
| HOOC ManagementPortal | Web-based administration interface for resellers, customers, and support staff. Access via HTTPS. | User management (RBAC), password rules, 2FA, rights assignment, log display |
| HOOC gateway webinterface | Local configuration interface of the HOOC gateway. Only accessible after physical activation or via the HOOC Cloud. | Activation button for access, Internet access from LAN (can be activated/deactivated) |
| VPN tunnel (Secure Remote Access) | Encrypted Layer 2 connection between gateway, cloud, and app. | Automatically managed keys, no user configuration required/possible |
| Secure Proxy / Cloud services | Services that enable access to facility resources. | Access control via labels and user rights |
| HOOC app | Mobile or desktop apps for end users with VPN functionality. | Enable/disable use of user certificate and 2FA, local password storage |
| API (REST / MQTT) | Interfaces for integrators for automation and data integration. | Access only with valid token and TLS, rights controlled via labels |
| Firmware update system | Provision of verified firmware images. | Only signed firmware, update via ManagementPortal, integrity check during loading |
| Logging & monitoring | Central recording of security-related events. | Visible in the ManagementPortal, optional export for audits |
None of the components used in the HOOC solution have default passwords. Each user sets their own password when creating an account.
Before passwords are accepted, their strength is evaluated using a series of positive and negative criteria. The evaluation yields a value between 0 and 100. A password must have a strength of at least 80.
To create a strong password, the following requirements must be met:
Passwords do not have a defined validity period. However, it is recommended to change your password regularly if two-factor authentication (2FA) is not used or if there is any suspicion of compromise.
Please note that after 15 failed login attempts within two minutes, the account will be temporarily locked for one hour.
Permissions are strictly assigned according to account type and defined role (reseller, customer, supporter, system user). Users are only granted the rights they need to perform their tasks (least privilege principle).
The HOOC gateway uses only encrypted connections (HTTPS and VPN). No unencrypted ports, protocols or external services outside the HOOC Cloud are required for its operation.
Incoming and outgoing network traffic should be restricted in accordance with the documented minimum requirements.
Communication between the HOOC gateway, HOOC Cloud, and HOOC apps takes place exclusively via TLS 1.2 or higher with modern cipher suites.
Digital signatures ensure that firmware and configuration files are unchanged and authentic.
Device keys are generated once during production, stored securely in the hardware, and are not accessible to third parties. The device key is used to authenticate the device and to verify the authenticity of the software.
The HOOC gateway logs security-related events for traceability and error analysis. Logging is carried out in accordance with data protection regulations and is limited to security-critical processes. This includes:
The logs can be viewed and evaluated via the HOOC ManagementPortal. Integrators should check log data regularly and archive it securely.
For access to log files, you can contact HOOC Support at info@hooc.ch. To provide the log files, the serial number, the site data id, and the email address of the requesting account are required.
To ensure the IT security and operational reliability of the HOOC solution, the following best practices are recommended:
Defense in depth refers to a security concept in which several independent protective measures are used to secure a system. The aim is to ward off attacks even if a single protective measure fails. Instead of relying on a single security barrier (e.g., a password or firewall), different levels are combined:
Each layer contributes to minimizing risks and enhancing the overall resilience of the system.
The following measures, technologies, and concepts related to perimeter security are recommended and must be provided and implemented as such by the environment in which the HOOC gateway is installed:
Network security is ensured through the use of the VPN tunnel and the fully encrypted communication between the HOOC gateway and the HOOC Cloud. Data traffic to destinations outside the HOOC Cloud can be enabled or disabled in the HOOC gateway using the Internet access from LAN option. From a network security perspective, it is recommended to disable this option.
To further improve network security, the following measures and concepts are recommended, which must be provided by the installation environment:
To ensure application security, the following measures, technologies, and concepts are provided for the HOOC gateway and its interaction with the HOOC Cloud and users:
To ensure a high level of security at the system level (host security), the following measures and technologies are used in HOOC gateways:
The protection of sensitive data (data security) is a top priority for the HOOC solution. To ensure the confidentiality, integrity, and availability of configuration and process data, specific technical measures and security concepts are implemented. These form an integral part of the system architecture. The following applies to HOOC gateways:
certutil -hashfile [file] SHA256sha256sum [file]shasum -a 256 [file]
The hash output must match the value published in the HOOC ManagementPortal exactly. If the checksum does not match, the firmware must not be installed.The measures listed in the defense-in-depth concept for the layers perimeter security and network security must be provided by the installation environment.
The following measures are recommended to ensure the secure integration of the HOOC solution into an existing IT environment:
If you encounter security-related issues with the HOOC solution, you can contact us by email at security@hooc.ch. In order to investigate the incident efficiently, the following information is required:
Upon receipt, HOOC automatically confirms receipt by email, creates a ticket, and simultaneously informs the HOOC Security Team. This ticket is then processed by the HOOC Security Team. The applicant will be informed of the next steps once the security-related issue has been investigated.
After security issues have been assessed, the following periods apply for their disclosure and resolution:
| Assessment | Disclosure | Resolution |
|---|---|---|
| Low | within 6 months | within 12 months |
| Medium | within 30 days | within 60 days |
| High | within 14 days | within 30 days |
If a HOOC gateway is uninstalled and implemented in another environment, the device must be reset to factory settings and all supporters, system users, and services must be removed from the HOOC Cloud. This ensures that no old data remains and unauthorized access is prevented. The device can then be considered as good as new.
For the secure decommissioning of a HOOC gateway, the device must be returned to HOOC AG in addition to the actions described above. The internal flash memory contains data such as authentication keys between the HOOC gateway and the HOOC Cloud, which cannot be reliably deleted by users. The device must be returned to HOOC AG in order to ensure that no old data remains and unauthorized access can be prevented.
This policy describes the security-related requirements and rules of conduct for the use of the HOOC solution by users (supporters and system users) and administrators (resellers). The aim is to ensure the integrity, availability, and confidentiality of the systems and data. Cooperation between users and administrators is essential for protecting the infrastructure.
Resellers are responsible for the secure configuration, maintenance, and monitoring of HOOC gateways as well as the work performed in the HOOC ManagementPortal. The following measures are mandatory:
Users of the HOOC solution are required to comply with the following security requirements:
The HOOC ManagementPortal offers structured user management with different account types, each with different areas of application and permissions.
| Account type | Description | User type | Access rights |
|---|---|---|---|
| Reseller | Main account with admin rights, used to centrally manage customers, systems, and sites. | For system integrators or providers | Full access (standard) or restricted access to all customers and systems (ManagementPortal and ClientApp) |
| Customer | Sub-account (of the reseller account), used to manage multiple company systems and sites. | For companies or organizations with multiple sites/systems | Full access to all sites/systems of the company or organization (ManagementPortal and ClientApp) |
| Supporter | Additional account, added either to a reseller, customer or site (or all of them), in order to provide regular or temporary support. | For technical staff, external service providers, or third parties | Restricted access: Individual user rights (admin/read/write) are assigned based on each person’s role (ManagementPortal and ClientApp) |
| Site user | User account to manage one’s own site(s) via the app. | For end users | Restricted Access: Site management via the HOOC CompactApp, but no rights in the ManagementPortal. |
A reseller account is the main account with comprehensive administrator rights. It is used for the central management of customers and systems. This type of account is typically intended for system integrators or providers.
A customer account is a sub-account of a reseller and is used to group systems, e.g., for a specific customer. This account type is suitable for organizations with multiple installations.
The system is not a user account type in the traditional sense. It represents a single installation that includes a gateway and associated services. It represents a specific location or system.
In addition, there are supporter accounts, which are intended for technical support. These users receive individually assigned rights at the reseller, customer, or system level, for example as administrators with read/write rights or with read-only rights.
Finally, there are system users who can access services via the HOOC CompactApp but do not have rights in the ManagementPortal. They are designed for end users with restricted access rights. To control access for system users, HOOC uses a role-based system with so-called labels, which function as access control lists (ACLs). Labels define which users have read or write rights to certain services and their elements. Rights can be assigned with fine granularity, for example to alarm rules, data points, etc.
The general permissions and restrictions depend on the respective level. Resellers have full access to all customers and their systems by default, but can be restricted by deactivated admin rights. Customers have access to their own systems, but no access to the reseller level. Supporters receive individually defined rights and can only access the level assigned to them. System users, in turn, have access exclusively via the CompactApp and only to the services assigned to them.
Rules stored in the HOOC ManagementPortal guarantee strong passwords for all account types. As an additional protection mechanism and for enhanced security, the activation and use of two-factor authentication (2FA) is recommended.
Sharing or disclosing passwords poses a high security risk. The account types in the HOOC ManagementPortal are designed accordingly to prevent this. It is recommended that reseller accounts be registered with a general and permanent email address associated with the integrator’s company. Access to the reseller account for integrator employees must be provided through supporter accounts. It is recommended that access for support staff be restricted as much as possible and that two-factor authentication (2FA) be required.
After completing work in the HOOC ManagementPortal and on the configuration pages of the HOOC gateway, it is always recommended to explicitly close the session.