EasyManua.ls Logo

Siemens SINAMICS - Page 17

Siemens SINAMICS
236 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5LVNDQDO\VLV
*XLGHOLQHV
RUJDQL]DWLRQDO
PHDVXUHV
7HFKQLFDOPHDVXUHV
9DOLGDWLRQDQG
LPSURYHPHQW
Figure 3-2 Security management process
1. Carry out a risk analysis. Determine all possible risks and define countermeasures for
reducing the risk to an acceptable level. In detail, a risk analysis encompasses the following
steps:
Identification of threatened objects
Analysis of value and potential for damage
Threat and weak point analysis
Identification of existing security measures
Risk evaluation
2. Define guidelines and introduce coordinated, organizational measures. To this end, the
awareness of the importance of industrial security must be borne by all levels of the
company. In addition, define guidelines and processes in order to achieve a uniform
procedure and to support compliance with the defined Industrial Security concept.
3. Introduce coordinated technical measures. You can find a list of general measures that
help to protect your plant against threats in Section General security measures (Page 19).
You can find measures recommended for SINAMICS environments in chapter Security
measures for SINAMICS (Page 31).
4. A security audit must ensure that all of the measures have been implemented and that they
have also eliminated or reduced the identified risks.
Note
Continuous process
Due to constantly changing security threats, this process must be continuously repeated
in order to guarantee the security of your plant. For this reason, the security management
process must be seen as a continuous process.
Industrial Security
3.4 Security management
Industrial Security
Configuration Manual, 08/2017, A5E36912609A 17

Table of Contents

Other manuals for Siemens SINAMICS

Related product manuals