VEGAPULS 6X • Two-wire 4 ... 20 mA/HART
device code can also be found on the supplied information sheet " Ac-
cess protection". If this document is lost, the emergency device code
can be retrieved from your personal contact person after legitimation.
The storage and transmission of the device codes is always encrypt-
ed (SHA 256 algorithm).
7.3
Storing the codes in myVEGA
If the user has a " myVEGA" account, then the Bluetooth access code
as well as the device code are additionally stored in his account under
" PINs and Codes". This greatly simplifies the use of additional adjust-
ment tools, as all Bluetooth access and device codes are automati-
cally synchronized when connected to the " myVEGA" account
7.4
IT Security (IEC 62443-4-2)
The device in version with IT security (IEC 62443-4-2) provides pro-
tection against the following threats:
•
Data manipulation (violation of integrity)
•
Denial of Service DoS (violation of availability)
•
Spying (breach of confidentiality)
For this purpose, the device has proven safety functions:
•
User authentication
•
Event memory (logging)
•
Integrity check of the firmware
•
Resource management
•
Data backup for recovery
Note:
Observe the requirements from the documents " Cyber Security ac-
cording to IEC 62443-4-2" as well as the " Component Requirements"
for the VEGAPULS 6X. They must be fulfilled in order for the stag-
gered security strategy of the device to take effect as intended. You
can find the documents on our homepage or via " myVEGA.".
7 Access protection, IT security
51