Safety information   
1.1 Industrial security 
  Safety Integrated 
8  Function Manual, 08/2023, A5E03264275A 
1.1  Industrial security 
Siemens provides products and solutions with Industrial Security functions that support the 
secure operation of plants, systems, machines and networks. 
In order to protect plants, systems, machines and networks against cyber threats, it is 
necessary to implement (and continuously maintain) a holistic, state-of-the-art Industrial 
Security concept. Siemens products and solutions form part of such a concept. 
Customers are responsible for preventing unauthorized access to their plants, systems, 
machines and networks. These systems, machines and components should only be 
connected to an enterprise network or the Internet if and to the extent such a connection is 
necessary and only when appropriate security measures (e.g. firewalls and/or network 
segmentation) are in place. 
For additional information on Industrial Security measures that can be implemented, please 
visit: 
https://www.siemens.com/industrialsecurity (http://www.siemens.com/industrialsecurity) 
Siemens products and solutions undergo continuous development to make them even more 
secure. Siemens expressly recommends that product updates be applied as soon as they 
become available and that only the latest product versions be used. Use of product versions 
that are no longer supported, and failure to apply latest updates may increase customer’s 
exposure to cyber threats. 
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS 
Feed at: 
https://www.siemens.com/cert (https://www.siemens.com/cert) 
Additional information is provided on the Internet: 
Industrial security Configuration Manual 
(https://support.industry.siemens.com/cs/ww/en/view/108862708) 
 
Unsafe operating states resulting from software manipulation 
Software manipulations, e.g. viruses, Trojans, or worms, can cause unsafe operating states 
in your system that may lead to death, serious injury, and property damage. 
•  Update your software regularly. 
•  Integrate the automation and drive components into a holistic, state-of-the-art industrial 
security concept for the plant or machine. 
•  Make sure that you include all installed products into the holistic industrial security 
concept. 
•  Protect files stored on exchangeable storage media from malicious software by with 
suitable protection measures, e.g. virus scanners. 
 
On completion of commissioning, check all security-related settings.