8 NHA80945 04/2017
Machines, controllers, and related equipment are usually integrated into networks. Unauthorized persons
and malware may gain access to the machine as well as to other devices on the network/fieldbus of the
machine and connected networks via insufficiently secure access to software and networks.
WARNING
UNAUTHORIZED ACCESS TO THE MACHINE VIA SOFTWARE AND NETWORKS
In your hazard and risk analysis, consider all hazards that result from access to and operation on the
network/fieldbus and develop an appropriate cyber security concept.
Verify that the hardware infrastructure and the software infrastructure into which the machine is
integrated as well as all organizational measures and rules covering access to this infrastructure
consider the results of the hazard and risk analysis and are implemented according to best practices
and standards covering IT security and cyber security (such as: ISO/IEC 27000 series, Common
Criteria for Information Technology Security Evaluation, ISO/ IEC 15408, IEC 62351, ISA/IEC 62443,
NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for
Information Security).
Verify the effectiveness of your IT security and cyber security systems using appropriate, proven
methods.
Failure to follow these instructions can result in death, serious injury, or equipment damage.