Operational Environment And Security Assumptions; Intended Use - Siemens SIMATIC S7-1500 System Manual

Drive controller
Hide thumbs Also See for SIMATIC S7-1500:
Table of Contents

Advertisement

Living the concept
Technical solutions alone are not sufficient to effectively counter threats.
Cybersecurity must be part of the corporate culture and process landscape and must be
internalized and lived by all employees.
Continuously monitoring the security situation
Continuous monitoring of the cybersecurity situation through:
• Setting anomaly references and creating allow and deny lists based on normal network
communication and production machine behavior
• Establishment of an intrusion detection system (IDS) that generates alarms when unusual
behavior occurs in the network
• Introduction of a Security Incident and Event Management (SIEM) system to collect,
analyze, and evaluate events in real time to enable early countermeasures
• Measures regarding network security: e.g. network segmentation, firewalls, VPN, DMZ
(demilitarized zones)
4.5

Operational environment and security assumptions

4.5.1

Intended use

SIMATIC products are intended for use in industry. If you plan to use the product in a different
environment, check the conditions required for such use.
The product may be operated only by personnel qualified for the specific task in accordance
with the relevant documentation, in particular its warning notices and safety information.
Qualified personnel are those who, based on their training and experience, are capable of
identifying risks and avoiding potential hazards when working with these products.
Operational reliability and intended use
Observe the "Special information" section in Introduction (Page 10).
Area of application
Observe the section Areas of application (Page 60).
SIMATIC Drive Controller
System Manual, 11/2023, A5E46600094-AD
4.5 Operational environment and security assumptions
Industrial cybersecurity
29

Advertisement

Table of Contents
loading

Table of Contents