2.4
Industrial security
Note
Industrial security
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens products and solutions only represent one component of such a
concept.
The customer is responsible for preventing unauthorized access to its plants, systems,
machines and networks. Systems, machines and components should only be connected to
the enterprise network or the internet if and to the extent necessary and with appropriate
security measures (e.g. use of firewalls and network segmentation) in place.
Additionally, Siemens’ guidance on appropriate security measures should be taken into
account. For more information about industrial security, please visit:
Industrial security (
http://www.siemens.com/industrialsecurity
Siemens’ products and solutions undergo continuous development to make them more secure.
Siemens strongly recommends to apply product updates as soon as available and to always
use the latest product versions. Use of product versions that are no longer supported, and
failure to apply latest updates may increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed at:
Industrial security (
http://www.siemens.com/industrialsecurity
WARNING
Unsafe operating states resulting from software manipulation
Software manipulations (e.g. viruses, trojans, malware or worms) can cause unsafe operating
states in your system that may lead to death, serious injury, and property damage.
● Keep the software up to date.
● Incorporate the automation and drive components into a holistic, state-of-the-art industrial
security concept for the installation or machine.
● Make sure that you include all installed products into the holistic industrial security concept.
● Protect files stored on exchangeable storage media from malicious software by with
suitable protection measures, e.g. virus scanners.
Fundamental safety instructions
2.4 Industrial security
Power Module PM240-2
18
Hardware Installation Manual, 08/2017, A5E33294624B AG
Содержание SINAMICS G12
Страница 2: ......
Страница 8: ...Table of contents Power Module PM240 2 8 Hardware Installation Manual 08 2017 A5E33294624B AG ...
Страница 10: ...Changes in this manual Power Module PM240 2 10 Hardware Installation Manual 08 2017 A5E33294624B AG ...
Страница 118: ...Spare parts Power Module PM240 2 118 Hardware Installation Manual 08 2017 A5E33294624B AG ...
Страница 156: ...Appendix A 4 Abbreviations Power Module PM240 2 156 Hardware Installation Manual 08 2017 A5E33294624B AG ...
Страница 159: ......