
2.4
Industrial security
Note
Industrial security
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is necessary
to implement – and continuously maintain – a holistic, state-of-the-art industrial security
concept. Siemens products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Systems, machines, and components should only be connected to the
enterprise network or the Internet if and to the extent that it is necessary and with appropriate
security measures in place (e.g. use of firewalls and network segmentation).
Recommendations from Siemens regarding appropriate security measures should also be
observed. You can find more information about industrial security under:
Industrial security (
http://www.siemens.com/industrialsecurity
)
Siemens products and solutions undergo continuous development to make them increasingly
more secure. Siemens strongly recommends that product updates are applied as soon as they
are available and that the latest product versions are used. Using outdated or unsupported
versions can increase the risk of cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed
at:
Industrial security (
http://www.siemens.com/industrialsecurity
)
You can find more information on the Internet:
Industrial Security Configuration Manual (
https://support.industry.siemens.com/cs/mdm/
108862708?c=89854859915&lc=en-WW
)
WARNING
Unsafe operating states resulting from software manipulation
Software manipulation (e.g. viruses, trojans, malware or worms) can cause unsafe operating
states in your system that may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art industrial
security concept for the installation or machine.
• Make sure that you include all products used in your seamless and holistic industrial security
concept.
• Protect files stored on exchangeable storage media from malicious software by with suitable
protection measures, e.g. virus scanners.
• Protect the drive against unauthorized changes by activating the "know-how protection"
drive function.
Basic safety instructions
2.4 Industrial security
SIMOCRANE CenSOR
12
Operating Instructions, 07/2021
Summary of Contents for 6GA7202-2AA10-1BF1
Page 2: ......
Page 8: ...Table of contents SIMOCRANE CenSOR 6 Operating Instructions 07 2021 ...
Page 10: ...Introduction SIMOCRANE CenSOR 8 Operating Instructions 07 2021 ...
Page 62: ...Commissioning 7 3 Setting up the camera SIMOCRANE CenSOR 60 Operating Instructions 07 2021 ...
Page 158: ...Appendix A 3 Standards and certifications SIMOCRANE CenSOR 156 Operating Instructions 07 2021 ...
Page 168: ...Index SIMOCRANE CenSOR 166 Operating Instructions 07 2021 ...