Preface
SIMATIC CM 1242-5
Operating Instructions, 01/2023, C79000-G8976-C245-06
5
Cross-references in the PDF
In this manual, there are often cross-references to other sections. To be able to return to the
initial page after jumping to a cross-reference, some PDF readers support the command
<Alt>+<left arrow>.
Search
To show all places where a term was found in a list, some PDF readers support the command
<Ctrl>+<Shift>+<F>.
Security information
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be connected
to an enterprise network or the internet if and to the extent such a connection is necessary
and only when appropriate security measures (e.g. firewalls and/or network segmentation)
are in place.
For additional information on industrial security measures that may be implemented, please
visit
Link: (https://www.siemens.com/industrialsecurity)
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure to
cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
Link: (https://www.siemens.com/cert)
Observe the following security recommendations to prevent unauthorized access to the
system.
• Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
• Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
• Restrict physical access to the device to qualified personnel.
• Configure a protection level of the CPU.