Notes On Information Security - Beckhoff CX8190 Manual

Embedded pc with ethernet
Table of Contents

Advertisement

• Observe the relevant accident prevention regulations for your machine (e.g. the BGV A 3, electrical
systems and equipment).
• Ensure standard-compliant connection and avoid risks to personnel. Ensure that data and supply
cables are laid in a standard-compliant manner and ensure correct pin assignment.
• Observe the relevant EMC guidelines for your application.
• Avoid polarity reversal of the data and supply cables, as this may cause damage to the equipment.
• The devices contain electronic components, which may be destroyed by electrostatic discharge when
touched. Observe the safety precautions against electrostatic discharge according to DIN EN
61340-5-1/-3.
Working with networks
• Restrict access to all devices to an authorized circle of persons.
• Change the default passwords to reduce the risk of unauthorized access.
• Protect the devices with a firewall.
• Apply the IT security precautions according to IEC 62443, in order to limit access to and control of
devices and networks.
Working with the software
• The sensitivity of a PC against malicious software increases with the number of installed and active
software.
• Uninstall or disable unnecessary software.
Further information about the safe handling of networks and software can be found in the Beckhoff
Information System:
http://infosys.beckhoff.com
Document name
IPC Security Guideline
2.4

Notes on information security

The products of Beckhoff Automation GmbH & Co. KG (Beckhoff), insofar as they can be accessed online,
are equipped with security functions that support the secure operation of plants, systems, machines and
networks. Despite the security functions, the creation, implementation and constant updating of a holistic
security concept for the operation are necessary to protect the respective plant, system, machine and
networks against cyber threats. The products sold by Beckhoff are only part of the overall security concept.
The customer is responsible for preventing unauthorized access by third parties to its equipment, systems,
machines and networks. The latter should be connected to the corporate network or the Internet only if
appropriate protective measures have been set up.
In addition, the recommendations from Beckhoff regarding appropriate protective measures should be
observed. Further information regarding information security and industrial security can be found in our
https://www.beckhoff.com/secguide.
Beckhoff products and solutions undergo continuous further development. This also applies to security
functions. In light of this continuous further development, Beckhoff expressly recommends that the products
are kept up to date at all times and that updates are installed for the products once they have been made
available. Using outdated or unsupported product versions can increase the risk of cyber threats.
To stay informed about information security for Beckhoff products, subscribe to the RSS feed at https://
www.beckhoff.com/secinfo.
CX8190
Version: 1.5
For your safety
9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents