
Fundamental safety instructions
1.2 Industrial security
CU230P-2 Control Units
Compact Operating Instructions, 01/2017, A5E38815802B AA 5
Note
Industrial security
Siemens provides products and solutions wit
h industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement
– and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens products and solutions only represent one component of such a
concept.
The customer is responsible for preventing unauthorized access to its plants, systems,
machines and networks. Systems, machin
es and components should only be connected to
the enterprise network or the internet if and to the extent necessary and with appropriate
security measures (e.g. use of firewalls and network segmentation) in place.
Additionally, Siemens’ guidance on approp
riate security measures should be taken into
account. For more information about industrial security, please visit:
http://www.siemens.com/industrialsecurity).
cts and solutions undergo continuous development to make them more
secure. Siemens strongly recommends to apply product updates as soon as available and to
always use the latest product versions. Use of product versions that are no longer supported,
and fa
ilure to apply latest updates may increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed at:
http://www.siemens.com/industrialsecurity).
Danger to life as a result of unsafe operating states resulting from software manipulation
Software manipulations (e.g. viruses, trojans, malware or worms) can cause unsafe
operating states in your system that may lead to death, serious injury, and property
damage.
•Keep the software up to date.
•Incorporate the automation and drive components into a holistic, state-of-the-art
industrial security concept for the installation or machine.
•Make sure that you include all installed products into the holistic industrial security
concept.
•Protect files stored on exchangeable storage media from malicious software by with
suitable protection measures, e.g. virus scanners.