4 Notes on Cyber-Security
To prevent unauthorized access to facilities and systems, observe the following security recommendations:
General
•
Periodically ensure that all relevant components meet these recommendations and any additional inter-
nal security policies.
•
Perform a security assessment of the entire system. Use a cell protection concept with suitable prod-
ucts.
For example, "ICS-Security-Kompendium" from the BSI (Federal Office for Security in Information
Technology, Bundesamt für Sicherheit in der Informationstechnik)
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ICS/ICS-Security_kompendium_pdf.html
shortened URL: http://bit.ly/1rP9znm
Physical access
•
Restrict physical access to security-relevant components to qualified personnel.
Security of the software
•
Keep software/firmware updated.
°
Stay informed about security updates for the product.
°
Stay informed about product updates.
You can find information about this at: www.mbconnectline.com
Passwords
•
Define rules for the use of the devices and assigning passwords.
•
Change passwords regularly, to increase security.
•
Use only passwords with a high password strength. Avoid weak passwords such as "password1",
"123456789".
•
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
•
Do not use the same password for different users and systems.
Page 10 von 131 | Version: 2.2.1 - EN | Mar 28
th
, 2022 |