hit counter script

Device Security Capabilities - Siemens 9810 Series User Manual

Hide thumbs Also See for 9810 Series:
Table of Contents

Advertisement

9410 series - User manual
• Zone boundary protection – The control system provides the capability to:
• No public internet connectivity – Access from the control system to the internet is not
recommended. If a remote site connection is needed encrypt protocol transmissions.
• Resource availability and redundancy – Ability to break the connections between different
network segments or use duplicate devices in response to an incident.
• Manage communication loads – The control system provides the capability to manage
communication loads to mitigate the effects of information flooding types of DoS (Denial of
Service) events.
• Control system backup – Available and up-to-date backups for recovery from a control
system failure.
• Encrypt protocol transmissions over all external connections – Use an encrypted
tunnel, TLS wrapper, or a similar solution.
Administrative assumptions
• Cybersecurity governance – Available and up-to-date guidance on the secure use of
information and technology assets in your company.
• Firmware upgrades – Meter upgrades are implemented consistently to the current version of
firmware.
For detailed information on the device security capabilities, see
page
27.

Device security capabilities

Your device includes security capabilities that, when combined with other defense-in-depth
measures, can help reduce vulnerabilities.
Before you install your device, carefully review the following device security capabilities to
understand how you can configure and use the device securely in a protected environment.
7EN05-0336-09
Manage connections through managed interfaces consisting of appropriate boundary
protection devices, such as proxies, gateways, routers, firewalls, and encrypted tunnels.
Use an effective architecture. For example, firewalls protecting application gateways
residing in a DMZ.
Control system boundary protections at any designated alternate processing sites should
provide the same levels of protection as that of the primary site. For example, data
centers.
Cybersecurity
"Device security capabilities" on
27

Advertisement

Table of Contents
loading

This manual is also suitable for:

9410 series

Table of Contents