Table of contents
S7-1500R/H redundant system
4 System Manual, 01/2024, A5E41814787-AF
4.5 Operational application environment and security assumptions .......................................... 40
4.5.1 Intended use ..................................................................................................................... 40
4.5.2 Requirements for the operational application environment and security assumptions ......... 41
4.6 Security properties of the devices ....................................................................................... 42
4.7 Secure operation of the system .......................................................................................... 42
4.7.1 Hardening measures .......................................................................................................... 42
4.7.2 Secure configuration ......................................................................................................... 43
4.7.3 Access control ................................................................................................................... 43
4.7.4 Handling of sensitive data .................................................................................................. 43
4.7.5 Regular firmware updates .................................................................................................. 44
4.7.6 Notifications about security vulnerabilities (Siemens Security Advisories) ............................ 44
4.7.7 Data backup ...................................................................................................................... 45
4.7.8 Security checks .................................................................................................................. 45
4.7.9 Secure decommissioning ................................................................................................... 45
4.7.9.1 Securely removing data ..................................................................................................... 46
4.7.9.2 Recycling and disposal ....................................................................................................... 47
4.8 Secure operation of the engineering software .................................................................... 48
4.9 Secure operation of CPUs ................................................................................................... 48
4.9.1 Secure configuration ......................................................................................................... 48
4.9.2 User management and access control ................................................................................ 48
4.9.2.1 Administration of user accounts ......................................................................................... 48
4.9.2.2 Assigning secure passwords ............................................................................................... 49
4.9.2.3 Password management ...................................................................................................... 49
4.9.2.4 Setting protection levels .................................................................................................... 50
4.9.2.5 Certificate management .................................................................................................... 50
4.9.3 Protection functions .......................................................................................................... 50
4.9.4 Web API of the Web server ................................................................................................. 50
4.9.5 Secure communication/OPC UA .......................................................................................... 51
4.9.6 Sensitive data .................................................................................................................... 51
4.9.7 Backups and data backups ................................................................................................. 51
4.9.8 Additional protective measures for network security .......................................................... 52
4.9.9 Remote access to CPU ........................................................................................................ 52
4.9.9.1 Using a Web server ............................................................................................................ 52
4.9.10 Recording Security events .................................................................................................. 52
4.9.11 Syslog messages ................................................................................................................ 53
4.9.11.1 Transfer the syslog messages to a syslog server .................................................................. 56
4.9.11.2 Structure of the Syslog messages ................................................................
....................... 59
4.10 Secure operation of I/O modules ........................................................................................ 62
4.11 Secure operation of the power supply modules .................................................................. 62
5 System overview ................................................................................................................................. 63
5.1 What is the S7-1500R/H redundant system? ....................................................................... 63
5.1.1 Areas of application ........................................................................................................... 64
5.1.2 Operating principle of the S7-1500R/H redundant system ................................................... 68
5.1.3 Plant components and automation levels ........................................................................... 79
5.1.4 Scalability .......................................................................................................................... 80
5.1.5 Overview of features ......................................................................................................... 84
5.2 Configuration .................................................................................................................... 85
5.2.1 Structure of the S7-1500R redundant system ..................................................................... 85