Recommendations for safe operation
There are various ways to prevent unauthorized access to the products depending on the system environment. Based on a risk and threat assessment, the system integrator decides which precautions must be taken in each specific case. The following chapters present various options for securing the products. With these measures, a security level comparable to SL 1 can be achieved within the system in most cases.
The following applies as a general rule:
- Reduce the attack surface.
- Only open ports that are required in your firewall. Close all other ports (Principle of Least Privilege).
- During operation, activate only the services that are required for operation.
- Limit access to rooms, control cabinets, and housings.
The implementation largely depends on whether the product is operated in a control cabinet or in a decentralized setup:
| ||
Products for installation in a control cabinet (degree of protection IP1. or IP2.) |
| Products for decentralized installation (degree of protection IP5. or IP6.) |
|
Additional information