Siemens SINAMICS Configuration Manual page 27

Industrial security, medium-voltage converter
Hide thumbs Also See for SINAMICS:
Table of Contents

Advertisement

● If possible, the PC should not be used for other tasks, e.g. in the office network. This is
used for separating the networks, which was dealt with in chapter "Separation of the
production and office networks (Page 21)".
● If you leave the PC to perform other tasks, always activate lock mode of the operating
system. This will prevent other people from reading the screen contents. Prevent
unauthorized access to the PC.
Data storage
When you store security-relevant data on your PC, you are responsible for secure data storage.
This includes, for example, the following measures:
● Consequent marking of your documents according to confidentiality levels by introducing
a document classification.
● Protection of your encrypted storage locations, such as sharepoints, against manipulation.
● Only store confidential or security-relevant data as encrypted data on your PC/systems or
the network.
Security-relevant data includes sensitive data, such as archives, passwords, or executable
files (*.exe).
● Regularly back up your security-relevant data. Protect the data backup from loss and
manipulation.
Transporting data
● Always send confidential and/or security-relevant data via encrypted e-mail.
● Only transport confidential and/or security-relevant data on data carriers that are classified
as secure, such as USB flash drives, hard disk, etc. Regularly check the data carriers for
viruses.
● Always save your data as encrypted data on local data storage media.
Apply the following measures when transporting data:
The specified measures especially apply for sensitive data, such as archives, passwords, or
executable files (*.exe).
Passwords
Data misuse due to passwords that are not secure
An unsecure password can easily lead to the misuse of data. Passwords that are not secure
can be easily cracked.
● Always change the default passwords already during the commissioning. Regularly adapt
the passwords after defined periods of time.
● Always keep your passwords secret. Make sure that only authorized persons have access
to the respective passwords.
Industrial Security
Configuration Manual, 08/2017, A5E36912609A
General security measures
4.3 System integrity
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents