Notes on Cyber-Security | Page 9
of 90
4
Notes on Cyber-Security
Note the following safety recommendations in order not to prevent unauthorized access to the system.
General
•
Make sure at regular intervals that all relevant components these recommendations and, if necessary,
meet other internal security guidelines.
•
Evaluate your system holistically in terms of safety. Take a cell protection concept with corresponding
products.
see for example "ICS Security Compendium" by Federal Office for Information Security (BSI-Germany)
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.html
shortened URL: http://bit.ly/1QXbuuZ
Physically access
•
Restrict physical access to safety relevant components to qualified personnel.
Security functions of the software
•
Keep the software / firmware up to date.
°
Inform yourself periodically about security updates of the product. Information, please visit: www.m-
bconnectline.com
°
Inform yourself periodically about product updates. Information, please visit: www.mbconnect-
line.com
Passwords
•
Define rules for the use of equipment and assigning passwords.
•
Regularly change the passwords to increase security.
•
Always use passwords with high strength password. Avoid weak passwords such. B. "password1",
"123456789" or the like.
•
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
•
Never use one password for different users and systems.