Recommendations for remote access
The creation of zones and the associated network segmentation form the basis for a defense-in-depth strategy. Segment into zones based on the results of the threat and risk analysis and the system conditions.
Remote access can be established, for example, via fieldbus interfaces such as PROFINET, EtherNet/IP™, or EtherCAT®.
- Perform a threat and risk analysis. Develop and implement a state-of-the-art remote access concept based on it. Threats must be taken into account, and unauthorized access must be prevented.
- To reduce the risk of unintentional changes to parameters, activate the parameter lock if available on the device.