Configuration, programming
4.1 Security recommendations
CM 1542-1
28
Operating Instructions, 07/2019, C79000-G8976-C355-04
Security functions of the product
Use the options for security settings in the configuration of the station. These includes
among others:
●
Protection levels
Configure access to the CPU under "Protection and Security".
●
Security function of the communication
–
Use the secure protocol variant HTTPS when accessing the Web server of the CPU
–
If you doe not require access to the Web server, leave access to the Web server of
the CPU (CPU configuration) and to the Web server of the CP disabled.
●
Protection of the passwords for access to program blocks
Protect the passwords stored in data blocks for the program blocks from being viewed.
You will find information on the procedure in the STEP 7 information system under the
keyword "Know-how protection".
Passwords
●
Define rules for the use of devices and assignment of passwords.
●
Regularly update the passwords to increase security.
●
Only use passwords with a high password strength. Avoid weak passwords for example
"password1", "123456789" or similar.
●
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
See also the preceding section for information on this.
●
Do not use one password for different users and systems.
Protocols
Secure and non-secure protocols
●
Only activate protocols that you require to use the system.
●
Use secure protocols when access to the device is not prevented by physical protection
measures.
Table: Meaning of the column titles and entries
The following table provides you with an overview of the open ports on this device.
●
Protocol / function
Protocols that the device supports.
●
Port number (protocol)
Port number assigned to the protocol.