Web-Based Configuration; Security Recommendations - Siemens LOGO! CIM Operating Manual

Table of Contents

Advertisement

Web-based configuration

5.1

Security recommendations

Keep to the following Security recommendations to prevent unauthorized access to the
system.
General
• You should make regular checks to make sure that the device meets these
recommendations and other internal security guidelines if applicable.
• Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
• Do not connect the device directly to the Internet. Operate the device within a protected
network area.
• Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
• Check regularly for new features on the Siemens Internet pages.
– Network security information
Physical access
Restrict physical access to the device to qualified personnel.
Passwords
• Regularly update the passwords to increase security.
• Only use passwords with a high password strength.
• Make sure that all passwords are protected and inaccessible to unauthorized personnel.
• Do not use one password for different users and system.
Protocols
• Only activate protocols that you require to use the system.
40
(https://new.siemens.com/global/en/products/automation/topic-areas/industrial-
security.html)
Operating Manual, 10/2021, A5E51250518-AA
5
LOGO! CIM

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

6ed1055-5mc08-0ba1

Table of Contents