Security Information - Siemens SINAMICS G120 Installation Manual

Power modules, ip20 / push-through technology (pt)
Hide thumbs Also See for SINAMICS G120:
Table of Contents

Advertisement

1.4

Security information

Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens' products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that may be implemented, please
visit
https://www.siemens.com/industrialsecurity (https://www.siemens.com/industrialsecurity).
Siemens' products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customer's exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
https://www.siemens.com/industrialsecurity
(https://new.siemens.com/global/en/products/services/cert.html#Subscriptions).
Further information is provided on the Internet:
Industrial Security Configuration Manual
(https://support.industry.siemens.com/cs/ww/en/view/108862708)
Unsafe operating states resulting from software manipulation
Software manipulations, e.g. viruses, Trojans, or worms, can cause unsafe operating states
in your system that may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art
• Make sure that you include all installed products into the holistic industrial security
• Protect files stored on exchangeable storage media from malicious software by with
• On completion of commissioning, check all security-related settings.
• Protect the drive against unauthorized changes by activating the "Know-how protection"
Power Module PM240-2
Hardware Installation Manual, 01/2020, A5E33294624B AL
WARNING
industrial security concept for the installation or machine.
concept.
suitable protection measures, e.g. virus scanners.
converter function.
Fundamental safety instructions
1.4 Security information
15

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sinamics pm240-2

Table of Contents