YASKAWA SLIO CP 042-1IO00 Manual page 39

Table of Contents

Advertisement

System SLIO
2.13.1.1
Protection of hardware and applications
Precautions
HB300 | CP | 042-1IO00 | en | 22-42
Industrial security and installation guidelines > Industrial security in information technology
n
Do not integrate any components or systems into public networks.
Use VPN "Virtual Private Networks" for use in public networks. This allows you to
control and filter the data traffic accordingly.
n
Always keep your system up-to-date.
Always use the latest firmware version for all devices.
Update your user software regularly.
n
Protect your systems with a firewall.
The firewall protects your infrastructure internally and externally.
This allows you to segment your network and isolate entire areas.
n
Secure access to your plants via user accounts.
If possible, use a central user management system.
Create a user account for each user for whom authorization is essential.
Always keep user accounts up-to-date and deactivate unused user accounts.
n
Secure access to your plants via secure passwords.
Change the password of a standard login after the first start.
Use strong passwords consisting of upper/lower case, numbers and special char-
acters. The use of a password generator or manager is recommended.
Change the passwords according to the rules and guidelines that apply to your
application.
n
Deactivate inactive communication ports respectively protocols.
Only the communication ports that are used for communication should be acti-
vated.
Only the communication protocols that are used for communication should be
activated.
n
Consider possible defence strategies when planning and securing the system.
The isolation of components alone is not sufficient for comprehensive protection.
An overall concept is to be drawn up here, which also provides defensive meas-
ures in the event of a cyber attack.
Periodically carry out threat assessments. Among others, a comparison is made
here between the protective measures taken and those required.
n
Limit the use of external storage media.
Via external storage media such as USB memory sticks or SD memory cards,
malware can get directly into a system while bypassing a firewall.
External storage media or their slots must be protected against unauthorized
physical access, e.g. by using a lockable control cabinet.
Make sure that only authorized persons have access.
When disposing of storage media, make sure that they are safely destroyed.
n
Use secure access paths such as HTTPS or VPN for remote access to your plant.
n
Enable security-related event logging in accordance with the applicable security
policy and legal requirements for data protection.
Basics and mounting
39

Advertisement

Table of Contents
loading

Table of Contents