Secure Configuration; Access Control; Handling Of Sensitive Data - Siemens SIMATIC S7-1500 System Manual

Drive controller
Hide thumbs Also See for SIMATIC S7-1500:
Table of Contents

Advertisement

Industrial cybersecurity
4.7 Secure operation of the system
4.7.2

Secure configuration

Secure configuration involves control over all software components, along with their
interfaces, ports, and services.
Activated services and ports pose a risk.
• One possible risk is unauthorized access to the network.
• Another risk is unauthorized access to programs.
To minimize risks, only the necessary services should be activated for all automation
components.
• Take into account all activated services (especially web servers, FTP, remote maintenance
etc.) in the security concept.
• Consider the default states of ports and services in your security concept.
You can find an overview of all ports and services used in the Communication Function
Manual (https://support.industry.siemens.com/cs/ww/en/view/59192925).
4.7.3

Access control

In addition to physical protection, also establish logical safeguards to control access to your
system:
• Use a restrictive user and rights management system (e.g. for accessing TIA Portal)
• Observe the information regarding password management in the section Protection
(Page 236) and in the STEP 7 online help (TIA Portal).
4.7.4

Handling of sensitive data

When storing your security-relevant data on your PC, independently ensure secure data
storage.
Observe also the section Data worth protecting (Page 41).
32
SIMATIC Drive Controller
System Manual, 11/2023, A5E46600094-AD

Advertisement

Table of Contents
loading

Table of Contents