CM 1542-1
Operating Instructions, 07/2019, C79000-G8976-C355-04
27
Configuration, programming
4
4.1
Security recommendations
Keep to the following security recommendations to prevent unauthorized access to the
system.
General
●
You should make regular checks to make sure that the device meets these
recommendations and other internal security guidelines if applicable.
●
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
●
Do not connect the device directly to the Internet. Operate the device within a protected
network area.
●
Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
●
Check regularly for new features on the Siemens Internet pages.
–
Here you can find information on Industrial Security:
Link: (
http://www.siemens.com/industrialsecurity
–
Here you can find information on security industrial communication:
Link: (
http://w3.siemens.com/mcms/industrial-communication/en/ie/industrial-ethernet-
security/Seiten/industrial-security.aspx
–
You can find a publication on the topic of network security (6ZB5530-1AP02-0BA5)
here:
Link:
http://w3app.siemens.com/mcms/infocenter/content/en/Pages/order_form.aspx?node
Key=key_518693&infotype=brochures
Enter the following filter: 6ZB5530
Physical access
Restrict physical access to the device to qualified personnel.
Network attachment
Do not connect the CM directly to the Internet. If a connection from the CM to the Internet is
required, arrange for suitable protection before the CM, for example a SCALANCE S with
firewall.