Web-Based Configuration; Security Recommendations - Siemens CIM Operating Manual

Table of Contents

Advertisement

Web-based configuration

5.1

Security recommendations

Keep to the following Security recommendations to prevent unauthorized access to the
system.
General
• You should make regular checks to make sure that the device meets these
recommendations and other internal security guidelines if applicable.
• Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
• Do not connect the device directly to the Internet. Operate the device within a protected
network area.
• Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
• Check regularly for new features on the Siemens Internet pages.
– Network security information
Physical access
Restrict physical access to the device to qualified personnel.
Passwords
• Regularly update the passwords to increase security.
• Only use passwords with a high password strength.
• Make sure that all passwords are protected and inaccessible to unauthorized personnel.
• Do not use one password for different users and system.
Protocols
• Only activate protocols that you require to use the system.
CIM
Operating Manual, 11/2022, A5E51250518-AC
(https://new.siemens.com/global/en/products/automation/topic-areas/industrial-
security.html)
5
41

Advertisement

Table of Contents
loading

Table of Contents