Fundamental safety instructions
1.3 Industrial security
1FT2 synchronous motors for SINAMICS S120
Configuration Manual, 03/2021, A5E50645584B AA
17
1.3 Industrial security
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks
.
In order to protect plants, systems, machines and networks against cyber threats, it
is
– and continuously maintain – a holistic, state-of-the-art industrial
security concept. Products and solutions from Siemens constitute one elem
ent of such a
Customers are responsible for preventing unauthorized access to
their plants, systems,
machines and networks. Such systems, machines and components should only be connected
to an enterprise network or the Internet if and to the exten
t such a connection is necessary
and only when appropriate security measures (e.g. usi
ng firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that can be implemented, please
visit:
ity (https://www.siemens.com/industrialsecurity)
’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are app
lied as soon as they
become available, and that only the latest product versions are us
ed. Use of product versions
that are no longer supported, and failure to apply the latest updates may increase customer
’s
exposure to cyber threats.
out product updates, subscribe to the Siemens Industrial Security RSS
Industrial security (https://www.siemens.com/industrialsecurity)
Further information is provided on the Internet:
Industrial Security Configuration Manual
(https://support.industry.siemens.com/cs/ww/en/view/108862708)
Unsafe operating states resulting from software manipulation
Software manipulations, e.g. viruses, Trojans, or worms, can cause unsafe operating states
in your system that may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art
industrial security concept for the installation or machine.
• Make sure that you include all installed products into the holistic industrial security
concept.
• Protect files stored on exchangeable storage media from malicious software by with
suitable protection measures, e.g. virus scanners.
• On completion of commissioning, check all security-related settings.
• Protect the drive against unauthorized changes by activating the "Know-how protection"