Information About Cyber-Security - MB Connect Line mbNET.rokey RKH 210 Manual

Hide thumbs Also See for mbNET.rokey RKH 210:
Table of Contents

Advertisement

5

Information about cyber-security

To prevent unauthorized access to facilities and systems, observe the following security recommendations:
General
• Periodically ensure that all relevant components meet these recommendations and any additional inter-
nal security policies.
• Perform a security assessment of the entire system. Use a cell protection concept with suitable prod-
ucts.
For example, "ICS-Security-Kompendium" from the BSI (Federal Office for Security in Information
Technology, Bundesamt für Sicherheit in der Informationstechnik)
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ICS/ICS-Security_kompendium_pdf.html
shortened URL: http://bit.ly/1rP9znm
Physical access
• Restrict physical access to security-relevant components to qualified personnel.
Security of the software
• Keep software/firmware updated.
° Stay informed about security updates for the product.
° Stay informed about product updates.
You can find information about this at: www.mbconnectline.com
Passwords
• Define rules for the use of the devices and assigning passwords.
• Change passwords regularly, to increase security.
• Use only passwords with a high password strength. Avoid weak passwords such as "password1",
"123456789".
• Make sure that all passwords are protected and inaccessible to unauthorized personnel.
• Do not use the same password for different users and systems.
Information about cyber-security | Page 15 of 324

Advertisement

Table of Contents
loading

Table of Contents