LOGO! CIM
40
Operating Manual, 10/2021, A5E51250518-AA
Web-based configuration
5
5.1
Security recommendations
Keep to the following Security recommendations to prevent unauthorized access to the
system.
General
•
You should make regular checks to make sure that the device meets these
recommendations and other internal security guidelines if applicable.
•
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
•
Do not connect the device directly to the Internet. Operate the device within a protected
network area.
•
Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
•
Check regularly for new features on the Siemens Internet pages.
–
Network security information
https://new.siemens.com/global/en/products/automation/topic-areas/industrial-
Physical access
Restrict physical access to the device to qualified personnel.
Passwords
•
Regularly update the passwords to increase security.
•
Only use passwords with a high password strength.
•
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
•
Do not use one password for different users and system.
Protocols
•
Only activate protocols that you require to use the system.