Planning the use
3.10 Planning information security
Wireless Teach Pendant F IWLAN V2
62 Operating Instructions, 08/2010, A5E02453837-01
● F-CPU and safety program
Task Additional information Check
Use passwords to protect access to the F CPU
and safety program.
Programming and operation manual
"S7 Distributed Safety - Configuring
and Programming"
(http://support.automation.siemens.
com/WW/view/en/22099875),
section "Protection against attack"
● WinCC flexible ES
Task Additional information Check
Protect WinCC flexible Es with general IT
technologies.
Examples:
Protect the PC where the ES is installed on
the operating system level with a password.
Use a suitable encryption program to
encrypt files, folders, and partitions.
Assign the access right for a drive only to a
specific group of people.
Encrypt the data with mechanisms provided
by MS Windows.
–
Use a password to protect the "Effective range
name" object.
WinCC flexible Information System
You can find addition information on the topic of data security in the following publications:
● System manual "Fundamentals - Industrial Wireless LAN", section "Information security
of wireless communication in accordance with IEEE 802.11".
● Brochure "Wireless Communication Systems and their Security Aspects" published by the
German Federal Agency for Security in Information Technology