51
7 Access protection, IT security
VEGAPULS 6X • Two-wire 4 … 20 mA/HART
66190-EN-221107
device code can also be found on the supplied information sheet " Ac-
cess protection". If this document is lost, the emergency device code
can be retrieved from your personal contact person after legitimation.
The storage and transmission of the device codes is always encrypt-
ed (SHA 256 algorithm).
7.3 Storing the codes in myVEGA
If the user has a " myVEGA" account, then the Bluetooth access code
as well as the device code are additionally stored in his account under
" PINs and Codes".Thisgreatlysimpliestheuseofadditionaladjust-
ment tools, as all Bluetooth access and device codes are automati-
cally synchronized when connected to the " myVEGA" account
7.4 IT Security (IEC 62443-4-2)
The device in version with IT security (IEC 62443-4-2) provides pro-
tection against the following threats:
•
Data manipulation (violation of integrity)
•
Denial of Service DoS (violation of availability)
•
Spying(breachofcondentiality)
For this purpose, the device has proven safety functions:
•
User authentication
•
Event memory (logging)
•
Integritycheckofthermware
•
Resource management
•
Data backup for recovery
Note:
Observe the requirements from the documents " Cyber Security ac-
cording to IEC 62443-4-2" as well as the " Component Requirements"
fortheVEGAPULS6X.Theymustbefullledinorderforthestag-
geredsecuritystrategyofthedevicetotakeeectasintended.You
canndthedocumentsonourhomepageorvia"myVEGA.".