Recommendations for safe operation

There are various ways to prevent unauthorized access to the products depending on the system environment. Based on a risk and threat assessment, the system integrator decides which precautions must be taken in each specific case. The following chapters present various options for securing the products. With these measures, a security level comparable to SL 1 can be achieved within the system in most cases.

The following applies as a general rule:

  • Reduce the attack surface.
    • Only open ports that are required in your firewall. Close all other ports (Principle of Least Privilege).
    • During operation, activate only the services that are required for operation.
  • Limit access to rooms, control cabinets, and housings.

The implementation largely depends on whether the product is operated in a control cabinet or in a decentralized setup:

 

Products for installation in a control cabinet (degree of protection IP1. or IP2.)

 

Products for decentralized installation (degree of protection IP5. or IP6.)

See Recommendations for installation in a control cabinet.

 

See Recommendations for decentralized installation.